BT
x Your opinion matters! Please fill in the InfoQ Survey about your reading habits!

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3

Mobile Attacks and Defense

Posted by Charlie Miller on  Oct 17, 2011

In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.

Resilient Security Architecture

Posted by John Diamant on  Sep 27, 2011

In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.

Controlling and Steering Open Source Projects

Posted by Dirk Riehle on  Sep 12, 2011

In this IEEE article, author Dirk Riehle discusses how commercial software firms can control or steer open source projects to meet their business needs.

The Problem with Cloud-Computing Standardization

Posted by Sixto Ortiz Jr on  Sep 02, 2011

In this IEEE article, author Sixto Ortiz Jr. discusses the issues and challenges in cloud computing standardization. He also compares the cloud-computing standards proposed by various organizations. 2

Understanding Cloud Computing Vulnerabilities

Posted by Bernd Grobauer, Tobias Walloschek and Elmar Stöcker on  Aug 15, 2011

In this IEEE article, authors Bernd Grobauer, Tobias Walloschek and Elmar Stöcker discuss the cloud computing security and cloud-specific vulnerabilities.

Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT