Open Access Open Access  Restricted Access Subscription or Fee Access

Architectural Analysis for Improving Security using LBS with ATAM

Almas Begum, V. Cyrilraj


An increasing number of smart phones and PDA’s, allows people to use internet and often, store sensitive personal data , Mobile banking, Contact lists, information on Location(eg:GPS) and Sensor data. So smart phones need to protect data which is a challenging Security problem. Software architecture (evaluation) plays vital role in supporting the installation of multiple thirty party applications.

The objective of this paper is to propose an architecture for smart phones to provide security when using in LBS (Location Based Services) and analyzed above architecture with ATAM (Architectural Tradeoff Analysis Method).The main objective of ATAM is to make qualitative analysis on risks, sensitivity and trade-off points.


Security, ATAM, LBS, Quality Attributes, Software Architecture.

Full Text:



Rick Kazman,MarkKlein,Paul Clements, ATAM: Method for Architecture Evaluation, August 2000, Carnegie Mellon, SEI.

Understanding Quality Attributes, Felix Bachmann, Mark Klein

The essential components of software architecture design and analysisRickKazman, Len Bass, Mark Klein, 2006.

Scenario based Software Architecture evaluation methods: An Overview,MugurelT.Ionita, Dieter K.Hammer, HenkObbink

Architectural Quality in Development Processes: A Case Study,Anna Grimán and Maria Pérez,Journal Of Object Technology,Vol. 2, No. 2, March-April 2003.

Novel Architecture For Improving Security Using LBS in Mobile Devices, Almas Begum, V.Cyrilraj, pp 602-606.

“Quality Attributes – Technical report” Mario Barbacci Mark H. Klein Thomas A. Longstaff Charles B. Weinstock December 1995

”Using ATAM to evaluate a game based Architecture”, Ahmed BinSubaih, Steve Maddock.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.