BT
Older rss
  • Towards an Agile Software Architecture

    by Boyan Mihaylov on  Dec 28, 2015 10

    Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. He depicts the similarities and differences between these with a focus on three areas: the specifics of the software architect role, the timespan of the software architecture, and the output of the software architecture.

  • Hologram - Finally, AWS Key Distribution that Makes Sense

    by Arian Adair on  Mar 31, 2015

    Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram, a system that brings Amazon's Instance Profile mechanism to developer workstations. Adair details the process, tool design and main features.

  • Cloud Security Auditing: Challenges and Emerging Approaches

    by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

    Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.

A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3

Securing Servers in the Cloud: An Interview With Trend Micro

Posted by Richard Seroter on  Nov 13, 2013

What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.

Automating Data Protection Across the Enterprise

Posted by Arshad Noor on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise.

Don't SCIM over your Data Model

Posted by Ganesh Prasad on  Aug 08, 2012

This opinion piece discusses limitations in the SCIM data model specification as perceived by the author. He provides three specific suggestions which were also posted to the SCIM mailing list. 5

Standardizing the Cloud for Security

Posted by Orlando Scott-Cowley on  Jul 05, 2012

Orlando Scott-Cowley discusses security in the cloud and the need for industry standards to lower the barriers to entry while ensuring that customer data is safe.

A Distributed Access Control Architecture for Cloud Computing

Posted by Abdulrahman A. Almutairi, Muhammad I. Sarfraz, Saleh Basalamah, Walid G. Aref, Arif Ghafoor on  Jun 12, 2012

In this article, authors discuss a distributed architecture based on principles from security management and software engineering to address cloud computing’s security challenges.

Managing Security Requirements in Agile Projects

Posted by Rohit Sethi on  Jun 04, 2012

Managing security requirements from early phases of software development is critical. In this article, author Rohit Sethi discusses how to map security requirements to user stories in Agile projects. 2

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 1

Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT