In this IEEE article, authors Stephen Yau and Ho An talk about application development using service-oriented architecture and cloud computing technologies. They also discuss application development challenges like security in a multi-tenant environment, quality-of-service monitoring, and mobile computing.
In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system (ITS) architectures and their efficiency for intrusion tolerance and survivability. For the ITS architectures, they propose a taxonomy with four categories: detection triggered, algorithm driven, recovery based, and hybrid.
Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams.
In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.
In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.
In this IEEE article, author Dirk Riehle discusses how commercial software firms can control or steer open source projects to meet their business needs.
In this IEEE article, author Sixto Ortiz Jr. discusses the issues and challenges in cloud computing standardization. He also compares the cloud-computing standards proposed by various organizations. 2
In this IEEE article, authors Bernd Grobauer, Tobias Walloschek and Elmar Stöcker discuss the cloud computing security and cloud-specific vulnerabilities.
In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1
In this IEEE article, Balakrishna Narasimhan and Ryan Nichols discuss results of a survey of organizations with experience using cloud applications and platforms.
In this IEEE article, Richard Welke, Rudy Hirschheim and Andrew Schwarz discuss a SOA maturity model that can be used to achieve organizational objectives.
In this IEEE article, John Stouby Persson and Lars Mathiassen discuss a process for managing risks associated in managing the distributed software projects. 2