Location based security architecture evaluated using ATAM
-
https://doi.org/10.14419/ijet.v7i1.7.9581
Received date: February 17, 2018
Accepted date: February 17, 2018
Published date: February 5, 2018
-
ATAM, Mobile Architecture, Software Architecture, MVC. -
Abstract
The usage of internet along with growing number of smart phones let public to access and store delicate data , Mobile banking, Contact lists, information on Location(EG: GPS), Etc. regularly. So it is becoming a challenging task to provide Security to smart phones for protecting data. The most important step in the early stage of software development is architecture representation and analysis. The objective of this paper is to propose an architecture for smart phones, represent using MVC model and evaluated using ATAM to extract security quality attributes. ATAM list the quality attributes in the following categories that is Risk, Non-Risk, Tradeoff and sensitivity points.
-
References
- Rick Kazman, MarkKlein, Paul Clements, ATAM: Method for Ar-chitecture Evaluation, August 2000, Carnegie Mellon, SEI.
- “Scenario-Based Software Architecture Evaluation Methods: An Overview “, Mugurel T. Ionita1, Dieter K. Hammer, HenkObbink
- “Software Quality: Definitions and Strategic Issues”, Ronan Fitzpat-rick Staffordshire University, School of Computing Report, April 1996.
- Novel Architecture for improving Security using LBS in Mobile De-vices.
- “Architectural Analysis for Improving Security using LBS with ATAM” Almas Begum and V. Cyrilraj.
- Understanding Quality Attributes, from Understanding Quality At-tributes, from Software Architecture in Practice by Felix Bachmann, Mark Klein.
- The essential components of software architecture design and analy-sis RickKazman, Len Bass, Mark Klein, 2006.
- Scenario based Software Architecture evaluation methods: An Over-view, MugurelT. Ionita, Dieter K. Hammer, HenkObbink.
- Architectural Quality in Development Processes: A Case Study, An-na Grimán and Maria Pérez, Journal Of Object Technology, Vol. 2, No. 2, March-April 2003.
- Using ATAM to Evaluate a Game-based Architecture Ahmed Bin-Subaih1, Steve Maddock1.
-
Downloads
-
How to Cite
Begum, A., & Cyril Raj, V. (2018). Location based security architecture evaluated using ATAM. International Journal of Engineering and Technology, 7(1.7), 87-90. https://doi.org/10.14419/ijet.v7i1.7.9581
