BT
Older Newer rss

Accessing Real-World APIs from Clojure

Posted by Pat Patterson  on  Jul 23, 2012

Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.

Who are You? Who am I? Who is Anybody?

Posted by Paul Downey  on  Mar 01, 2012 3

Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.

Spring Social: For the New Web of APIs

Posted by Craig Walls  on  Feb 27, 2012

Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.

Identity Management with Spring Security

Posted by David Syer  on  Feb 10, 2012 3

David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.

The Rise of OAuth

Posted by Craig Walls  on  Jan 26, 2012 1

Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.

Getting Started With Spring Security 3.1

Posted by Rob Winch  on  Dec 30, 2011

Rob Winch demoes some of the new features in Spring Security 3.1: multiple http elements, stateless authentication mode for RESTful services, Debug Filter, CAS support for proxy tickets, JAAS, etc.

SpringOne 2GX Keynote: Next Generation Applications

Posted by Ben Alex  on  Dec 01, 2011 1

Ben Alex along with a SpringSource team present the future of mobile applications, authorization, data, and application architecture as seen by VMware.

Enterprise SOA Security

Posted by Dirk Krafzig  on  Jan 05, 2011

Dirk Krafzig presents general aspects of implementing SOA security using a token and role-based approach rather than session and application-based access to resources, including organizational issues, such as the need for an enterprise security architect.

Introduction to Spring Security 3/3.1

Posted by Mike Wiesner  on  Jan 05, 2011 15

Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.

Failure: An Illustrated Guide

Posted by Avi Bryant  on  Dec 02, 2009

Avi Bryant explains the iterative process that led to the concept, implementation, and UI of Trendly (http://trendly.com/ ), using Smalltalk, Javascript, Ruby and Java in the process.

GluCon: Post-it Notes (mini-Keynotes)

Posted by Fulkerson, Durand, Marcoullier & Coffee  on  Jul 21, 2009

This presentation is a collection of five fifteen-minute mini-keynotes (called post-it notes) presented at the Glue conference in Denver, 2009. All presentations focused on aspects of "gluing together" web applications, with Fulkerson talking about WOA, and most of the others presenting various ideas about identity and sharing / assuring identity across sites and applications.

Building Context Aware Services using Identity as Foundation

Posted by Phil Windley  on  Jul 14, 2009

This presentation explores the issue of context automation, the forces driving it (clouds, extensible browsers, internet identities) and then focuses on issues of identity and how identity services augment context and facilitate using features of the cloud and extensible browsers to provide a richer and more secure user experience.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT