InfoQ Homepage Security Content on InfoQ
-
Google Apps' Identity Crisis
Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.
-
Building a Cloud Ecosystem Architecture
Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.
-
Keynote: Embracing Uncertainty
Dan North discusses the need to embrace uncertainty of scope, technology, effort and structure, expecting the unexpectable and anticipating ignorance.
-
Famous Unsolved Codes: Kryptos
Elonka Dunin reviews the CIA Kryptos’ history, going over the parts that have been solved, and discussing efforts to crack the famous unsolved section, K4.
-
Faster, Cheaper Identity Management through Loose Coupling – the LIMA Approach
Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,
-
Keynote: System, Heal Thyself
Mike Andrews discusses architecting for failure even you when don’t know what might fail.
-
Certifying Your Car with Erlang
John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.
-
Security Vulnerabilities for Grown-ups
Vitaly Osipov shares 7 product security lessons learned at Atlassian related to why security incidents happen, what we would like to do about them and what can be done.
-
Hook-up to the Social Networks with OAuth 2.0
John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.
-
OAuth - Everything You Want to Know (Hopefully)
Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.
-
Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
-
Securing the Cloud: Identity Management and Network Security in the Cloud
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.