BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage IEEE Content on InfoQ

  • Verification and Validation for Trustworthy Software Systems

    In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems using techniques like statechart assertions, runtime execution monitoring, and scenario-based testing.

  • Pattern-Based Architecture Reviews

    In this IEEE article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review (PBAR) process to help with system-wide quality attributes. They also discuss how PBAR approach helps with agile practices like frequent releases, changes for user needs, and lightweight documentation. They illustrate the benefits of PBAR process with a real-world project.

  • Codesign Challenges for Exascale Systems: Performance, Power, and Reliability

    In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability. The five factors discussed in the codesign process are algorithms, application, programming model, runtime system, and hardware architecture.

  • Software Engineering Meets Services and Cloud Computing

    In this IEEE article, authors Stephen Yau and Ho An talk about application development using service-oriented architecture and cloud computing technologies. They also discuss application development challenges like security in a multi-tenant environment, quality-of-service monitoring, and mobile computing.

  • Comparison of Intrusion Tolerant System Architectures

    In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system (ITS) architectures and their efficiency for intrusion tolerance and survivability. For the ITS architectures, they propose a taxonomy with four categories: detection triggered, algorithm driven, recovery based, and hybrid.

  • Developer-Driven Threat Modeling

    Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams.

  • Mobile Attacks and Defense

    In this IEEE article, author Charlie Miller talks about the mobile security vulnerabilities. He explains how smart phones are becoming targets of attackers and discusses security models of two smart phone operating systems: Apple's iOS and Google's Android. The attackers can get remote code to run on a mobile device in two ways: mobile malware and drive-by downloads.

  • Resilient Security Architecture

    In this IEEE article, author John Diamant talks about how to improve security quality of software applications using a proactive approach with techniques like Security requirements gap analysis and Architectural threat analysis in the early phases of software development life cycle.

  • Controlling and Steering Open Source Projects

    Open source software has become an important part of the software business. In this IEEE article, author Dirk Riehle discusses how the commercial software firms can control or steer open source software projects to meet their business needs. He talks about how these firms depend on open source and how they manage that dependency to meet their business goals.

  • The Problem with Cloud-Computing Standardization

    In this IEEE article, author Sixto Ortiz Jr. discusses the issues and challenges we are facing in cloud computing standardization. He also compares the cloud-computing standards proposed by organizations like Distributed Management Task Force (DMTF), IEEE, Open Grid Forum, OASIS, and Storage Networking Industry Association.

  • Understanding Cloud Computing Vulnerabilities

    In this IEEE article, authors Bernd Grobauer, Tobias Walloschek and Elmar Stöcker discuss the cloud computing security and cloud-specific vulnerabilities using the vulnerability definition from the Open Group's risk taxonomy.

  • Architecting a Cloud-Scale Identity Fabric

    In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities that network administrators must secure and to enable a full-scale cloud adoption.

BT