BT

New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8

Introduction to Cloud Security Architecture from a Cloud Consumer's Perspective

Posted by Subra Kumaraswamy on  Dec 07, 2011

Security concerns plague cloud consumers so how should these concerns be addressed? This article introduces the basic principles and patterns that should guide a cloud security architecture.

Architecting a Cloud-Scale Identity Fabric

Posted by Eric Olden on  Jun 29, 2011

In this IEEE article, author Eric Olden discusses an identity fabric that links multiple applications to a single identity to manage the volume of user identities in the cloud. 1

Cloud Computing Roundtable

Posted by Ivan Arce Anup Ghosh on  Apr 11, 2011

In this IEEE panel discussion article, guest editors Ivan Arce and Anup Ghosh facilitated the discussion on cloud computing security risks.

Wonderland Of SOA Governance

Posted by Michael Poulin on  Nov 11, 2009

In this article, Michael Poulin elaborates on the differences between of governance and management and tries to explore the 'wonderland' of governance in a service-oriented environment. 3

Enhanced Detection of Malware

Posted by Carlos Rozas Hormuzd Khosravi Divya Kolar Sunder and Yuriy Bulygin on  Sep 30, 2009

This article discusses significant new threats to host agents, outlines a generic architecture for malware detection, based on enhanced cloud computing, and outlines enhanced computing solutions.

Encrypting the Internet

Posted by Satyajit Grover Xiaozhu Kang Michael Kounavis andFrank Berry on  Sep 22, 2009

The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic using CPU instructions and a novel RSA algorithm to significantly reduce costs. 5

The Dark Cloud: Understanding and Defending against Botnets and Stealthy Malware

Posted by Jaideep Chandrashekar Carl Livadas Steve Orrin Eve Schooler on  Aug 04, 2009

Botnets are the latest scourge to hit the Internet and this article provides and presents several promising anti-botnet defense strategies that specifically target current and emerging trends.

Virtual Panel on Cloud Computing

Posted by Abel Avram on  May 19, 2009

Answering: What are the cloud computing benefits, public or private clouds, providing infrastructure or a platform, how can a client enforce regulatory compliance, and others.

BT