InfoQ Homepage Security Content on InfoQ
-
Who are You? Who am I? Who is Anybody?
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.
-
Spring Social: For the New Web of APIs
Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.
-
Remaining Hazards and Mitigating Patterns of Secure Mashups in ECMAScript 5
Mark S. Miller explains how to create secure mashups with ECMAScript 5, emphasizing the security pitfalls to be avoided and patterns to use in order to stay clear of them.
-
Identity Management with Spring Security
David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.
-
Architecting Visa for Massive Scale and Continuous Innovation
John Davies examines Visa’s architecture and shows how enterprises have architected complex integrations incorporating Hadoop, memcached, Ruby on Rails, and others to deliver innovative solutions.
-
The Rise of OAuth
Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.
-
Cloud Security or: How I Learned to Stop Worrying and Love the Cloud
Cloud security, according to IDC (2010), is the main worry for companies. Alon Hazy and Jakob Illeborg Pagter look at the threat landscape, and examine secure cloud solutions today and in the future.
-
Getting Started With Spring Security 3.1
Rob Winch demoes some of the new features in Spring Security 3.1: multiple http elements, stateless authentication mode for RESTful services, Debug Filter, CAS support for proxy tickets, JAAS, etc.
-
SpringOne 2GX Keynote: Next Generation Applications
Ben Alex along with a SpringSource team present the future of mobile applications, authorization, data, and application architecture as seen by VMware.
-
Secure Distributed Programming on ECMAScript 5 + HTML5 Platforms
Mark S. Miller explains how to create secure applications in ECMAScript 5 and HTML5 by turning JavaScript into a distributed secure programming language.
-
Mobile App Privacy — You’re Doing It Wrong (and So Am I)
Graham Lee advices on how to create an user experience that properly deals with privacy and, in some respect, security issues in mobile applications.
-
Security vs. Security Architecture
Marc Stiegler presents popular but faulty security architectures used - Independence Day Evil Alien Architecture, the Gilded Cage, and Gone Phishin' – along with effective architectures emerging today