• Followers

    Don't SCIM over your Data Model

    by Ganesh Prasad Follow 0 Followers on  Aug 08, 2012 5

    This opinion piece discusses three specific suggestions for improving the SCIM data model: 1. Both the enterprise client and cloud provider should map their internal IDs to a shared External ID, which is the only ID exposed through the API. 2. Multi-valued attributes of a resource must be converted from an array into a dictionary with unique keys. 3. 3 ways to improve the PATCH command

  • Followers

    Standardizing the Cloud for Security

    by Orlando Scott-Cowley Follow 0 Followers on  Jul 05, 2012

    Orlando Scott-Cowley discusses security in the cloud and the need for industry standards to lower the barriers to entry while ensuring that customer data is safe.

  • Followers

    A Distributed Access Control Architecture for Cloud Computing

    by Abdulrahman A. Almutairi Follow 0 Followers , Muhammad I. Sarfraz Follow 0 Followers , Saleh Basalamah Follow 0 Followers , Walid G. Aref Follow 0 Followers , Arif Ghafoor Follow 0 Followers on  Jun 12, 2012

    Cloud computing’s multitenancy and virtualization features pose unique security and access control challenges. In this article, authors discuss a distributed architecture based on the principles from security management and software engineering to address cloud computing’s security challenges.


Managing Security Requirements in Agile Projects

Posted by Rohit Sethi Follow 0 Followers on  Jun 04, 2012

Managing security requirements from early phases of software development is critical. In this article, author Rohit Sethi discusses how to map security requirements to user stories in Agile projects. 2


Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau Follow 0 Followers , Ho G. An Follow 0 Followers on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 1


Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor Follow 0 Followers on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8


Introduction to Cloud Security Architecture from a Cloud Consumer's Perspective

Posted by Subra Kumaraswamy Follow 1 Followers on  Dec 07, 2011

Security concerns plague cloud consumers so how should these concerns be addressed? This article introduces the basic principles and patterns that should guide a cloud security architecture.


Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden Follow 0 Followers on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1


Cloud Computing Roundtable

Posted by Ivan Arce Follow 0 Followers , Anup Ghosh Follow 0 Followers on  Apr 11, 2011

In this IEEE panel discussion article, guest editors Ivan Arce and Anup Ghosh facilitated the discussion on cloud computing security risks.


Wonderland Of SOA Governance

Posted by Michael Poulin Follow 0 Followers on  Nov 11, 2009

In this article, Michael Poulin elaborates on the differences between of governance and management and tries to explore the 'wonderland' of governance in a service-oriented environment. 3


Enhanced Detection of Malware

Posted by Carlos Rozas Follow 0 Followers , Hormuzd Khosravi Follow 0 Followers , Divya Kolar Sunder Follow 0 Followers , and Yuriy Bulygin Follow 0 Followers on  Sep 30, 2009

This article discusses significant new threats to host agents, outlines a generic architecture for malware detection, based on enhanced cloud computing, and outlines enhanced computing solutions.


Encrypting the Internet

Posted by Satyajit Grover Follow 0 Followers , Xiaozhu Kang Follow 0 Followers , Michael Kounavis andFrank Berry Follow 0 Followers on  Sep 22, 2009

The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic using CPU instructions and a novel RSA algorithm to significantly reduce costs. 5

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you