BT

Big Data and IT-Enabled Services: Ecosystem and Coevolution?

Posted by Bongsug (Kevin) Chae on  Jun 13, 2015

In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.

Fifteen Years of Service-Oriented Architecture at Credit Suisse

Posted by Stephan Murer Claus Hagen on  Apr 03, 2015

In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4

The Indian Banking Community Cloud

Posted by Lalit Sangavarapu Shakti Mishra Abraham Williams G.R. Gangadharan on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo Syed Rizvi William Aiken John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.

Simulation-Based Embedded Agile Development

Posted by Jason Ard Kristine Davidsen Terril Hurst on  Nov 16, 2014

In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.

Is Bitcoin a Decentralized Currency?

Posted by Arthur Gervais Ghassan O. Karame Vedran Capkun Srdjan Capkun on  Nov 01, 2014

Bitcoin currency is getting more attention than any other digital currency model. In this article, authors analyze Bitcoin's decentralized model and discuss solutions to enhance its decentralization. 2

BT