Location based security architecture evaluated using ATAM

  • Authors

    • Almas Begum
    • V Cyril Raj
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.9581
  • ATAM, Mobile Architecture, Software Architecture, MVC.
  • The usage of internet along with growing number of smart phones let public to access and store delicate data , Mobile banking, Contact lists, information on Location(EG: GPS), Etc. regularly.So it is becoming a challenging task to provide Security to smart phones for protecting data. The most important step in the early stage of software development is architecture representation and analysis.The objective of this paper is to propose an architecture for smart phones, represent using MVC model and evaluated using ATAMto extractsecurity quality attributes.ATAM list the quality attributes in the following categories that is Risk, Non-Risk, Tradeoff and sensitivity points.

  • References

    1. [1] Rick Kazman,MarkKlein,Paul Clements, ATAM: Method for Architecture Evaluation,August 2000, Carnegie Mellon, SEI.

      [2] “Scenario-Based Software Architecture Evaluation Methods: An Overview “, Mugurel T. Ionita1, Dieter K. Hammer, HenkObbink

      [3] “Software Quality:Definitions and Strategic Issuesâ€, Ronan Fitzpatrick Staffordshire University, School of Computing Report, April 1996.

      [4] Novel Architecture for improving Security using LBS in Mobile Devices.

      [5] “Architectural Analysis for Improving Security using LBS with ATAM†Almas BegumandV.Cyrilraj.

      [6] Understanding Quality Attributes, fromUnderstanding Quality Attributes, from Software Architecture in Practice by Felix Bachmann, Mark Klein.

      [7] The essential components of software architecture design and analysisRickKazman, Len Bass, Mark Klein, 2006.

      [8] Scenario based Software Architecture evaluation methods: An Overview,MugurelT.Ionita, Dieter K.Hammer, HenkObbink.

      [9] Architectural Quality in Development Processes: A Case Study, Anna Grimán and Maria Pérez, Journal Of Object Technology, Vol. 2, No. 2, March-April 2003.

      [10] Using ATAM to Evaluate a Game-based Architecture Ahmed BinSubaih1, Steve Maddock1.

  • Downloads

  • How to Cite

    Begum, A., & Cyril Raj, V. (2018). Location based security architecture evaluated using ATAM. International Journal of Engineering & Technology, 7(1.7), 87-90. https://doi.org/10.14419/ijet.v7i1.7.9581