International Conference on Web Services Computing |
Foundation of Computer Science USA |
ICWSC - Number 1 |
November 2011 |
Authors: A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani |
30ce925f-e75b-422c-9ba2-6eea0ef0d551 |
A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani . Mining for Secure Web based Business Intelligence Applications. International Conference on Web Services Computing. ICWSC, 1 (November 2011), 60-66.
Web Based Business Intelligence applications uses integrated and intensified technologies like Web 2.0 architectures, Agile Modeling, and Service-orientation (or Web Services). Applying Mining strategies to Web based Business Intelligence application will eventually provide benefits to Business Intelligence users, Decision makers, and importantly Web application architects. In this paper, we discuss about Mining for Web based Business Intelligence Applications. We validate our approach with a suitable exemplar CRM Application. This research entitled âDesigning Dependable Web Services Security Architecture Solutionsâ addresses the innovative idea of Web Services Security Engineering using Web Services Security Architectures with a research motivation of Secure Service Oriented Analysis and Design. It deals with Web Services Security Architectures for Composition and Contract design in general, and Authentication and authorization (access control) in particular, using Agile Modeled Layered Security Architecture design, which eventually results in enhanced dependable privacy requirements, Secure Policies and Trust negotiations. All the above findings are validated with appropriate case studies of Web 2.0 Services, BPEL for Role Based Access Control, a secure stock market financial application, and their extension for spatial mobile application for cloud etc. All this research paves a way to Secure Web Engineering (or) Secure Web Science.