Cloud computing’s multitenancy and virtualization features pose unique security and access control challenges. In this article, authors discuss a distributed architecture based on the principles from security management and software engineering to address cloud computing’s security challenges.
In this IEEE roundtable discussion hosted by guest editors Richard Chow, Markus Jakobsson, and Jesus Molina, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication.
In this IEEE article, author Mark Harman talks about evolutionary computation and how it has affected software design. Main focus is on search-based software engineering (SBSE), which focuses on the application of search-based optimization techniques to problems in software engineering. Mark also discusses the application of SBSE in emerging areas such as cloud, mobile and embedded systems.
In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems.
In this article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review process to help with quality attributes as well as agile practices like frequent releases. 1
In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability.
In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2
In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3
In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3
In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.
In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.
In this IEEE article, author Dirk Riehle discusses how commercial software firms can control or steer open source projects to meet their business needs.