InfoQ Homepage Security Content on InfoQ
-
OAuth - Everything You Want to Know (Hopefully)
Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.
-
Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
-
Securing the Cloud: Identity Management and Network Security in the Cloud
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
-
Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA
Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.
-
Fighting the 21st Century Fraudster
Kunal Bhasin discusses in-memory and Big Data computing techniques used for the detection of banking fraud in real time.
-
Accessing Real-World APIs from Clojure
Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
-
Mobile App Security Techniques and Traps
Graham Lee discusses designing, building and testing a secure mobile app, detailing several vulnerabilities that can be found in such apps and ways to deal with them.
-
Progressive Architectures at the Royal Bank of Scotland
Ben Stopford, Farzad Pezeshkpour and Mark Atwell discuss: the Manhattan processor – avoiding GC pauses-, beyond messaging with ODC, Risk, data virtualization and collaboration in banking.
-
Language-based Security as Extreme Modularity
Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller (moderator) present their view on achieving security while using modularity for building large systems.
-
Who are You? Who am I? Who is Anybody?
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.
-
Spring Social: For the New Web of APIs
Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.
-
Remaining Hazards and Mitigating Patterns of Secure Mashups in ECMAScript 5
Mark S. Miller explains how to create secure mashups with ECMAScript 5, emphasizing the security pitfalls to be avoided and patterns to use in order to stay clear of them.