In this paper we design and provide the tempering of systems can cause huge damage and hence it becomes extremely critical to understand all the aspects around avenues of security threats as well as understand the possible solutions to safeguard and secure the information flow. A Security Architecture Blueprint is must to bring focus to the key areas of concern for the enterprise, highlighting decision criteria and context for each domain. Security services provide confidentiality, integrity, and availability services for the platform. Security services are implemented as protection services, such as authentication and authorization, detection services, such as monitoring and auditing, and response services, such as incident response and forensics.
[1]
Anh Nguyen-Tuong,et al.
Automatically Hardening Web Applications Using Precise Tainting
,
2005,
SEC.
[2]
Westley Weimer,et al.
Talking to strangers without taking their candy: isolating proxied content
,
2008,
SocialNets '08.
[3]
Mark Handley,et al.
The final nail in WEP's coffin
,
2006,
2006 IEEE Symposium on Security and Privacy (S&P'06).
[4]
Karen A. Scarfone,et al.
Guide to Secure Web Services
,
2007
.
[5]
G. Manimaran,et al.
Internet infrastructure security: a taxonomy
,
2002,
IEEE Netw..