Architectural Analysis for Improving Security using LBS with ATAM
Abstract
An increasing number of smart phones and PDA’s, allows people to use internet and often, store sensitive personal data , Mobile banking, Contact lists, information on Location(eg:GPS) and Sensor data. So smart phones need to protect data which is a challenging Security problem. Software architecture (evaluation) plays vital role in supporting the installation of multiple thirty party applications.
The objective of this paper is to propose an architecture for smart phones to provide security when using in LBS (Location Based Services) and analyzed above architecture with ATAM (Architectural Tradeoff Analysis Method).The main objective of ATAM is to make qualitative analysis on risks, sensitivity and trade-off points.
Keywords
Full Text:
PDFReferences
Rick Kazman,MarkKlein,Paul Clements, ATAM: Method for Architecture Evaluation, August 2000, Carnegie Mellon, SEI.
Understanding Quality Attributes, Felix Bachmann, Mark Klein
The essential components of software architecture design and analysisRickKazman, Len Bass, Mark Klein, 2006.
Scenario based Software Architecture evaluation methods: An Overview,MugurelT.Ionita, Dieter K.Hammer, HenkObbink
Architectural Quality in Development Processes: A Case Study,Anna Grimán and Maria Pérez,Journal Of Object Technology,Vol. 2, No. 2, March-April 2003.
Novel Architecture For Improving Security Using LBS in Mobile Devices, Almas Begum, V.Cyrilraj, pp 602-606.
https://msdn.microsoft.com/en-in/library/ee658094.aspx
“Quality Attributes – Technical report” Mario Barbacci Mark H. Klein Thomas A. Longstaff Charles B. Weinstock December 1995
”Using ATAM to evaluate a game based Architecture”, Ahmed BinSubaih, Steve Maddock.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.