BT

Managing Security Requirements in Agile Projects

Posted by Rohit Sethi on  Jun 04, 2012

Managing security requirements from early phases of software development is critical. In this article, author Rohit Sethi discusses how to map security requirements to user stories in Agile projects. 2

The Future of Authentication

Posted by Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul van Oorschot on  May 04, 2012

In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1

Commitment – Writing a Graphic Novel explaining Real Options

Posted by Shane Hastie on  Apr 05, 2012

Building on their work on Real Options, Chris Matts and Olav Maassen are writing a graphic novel to explain the concepts and share their knowledge. They discussed the novel and the process with InfoQ.

Interview and Book Review: The CERT Oracle Secure Coding Standard for Java

Posted by Srini Penchikala on  Feb 15, 2012

"The CERT Oracle Secure Coding Standard for Java" book covers the rules for secure coding using Java programming language. InfoQ spoke with book authors on how these rules can help Java developers.

10 tips on how to prevent business value risk

Posted by Chris Matts and Olav Maassen on  Feb 07, 2012

One category of risk that project teams need to ensure they address is business value failure – delivering a product that fails to provide value for the business investor. 3

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2

Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8

Introduction to Cloud Security Architecture from a Cloud Consumer's Perspective

Posted by Subra Kumaraswamy on  Dec 07, 2011

Security concerns plague cloud consumers so how should these concerns be addressed? This article introduces the basic principles and patterns that should guide a cloud security architecture.

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT