InfoQ Homepage Security Content on InfoQ
-
Secure Distributed Programming on ECMAScript 5 + HTML5 Platforms
Mark S. Miller explains how to create secure applications in ECMAScript 5 and HTML5 by turning JavaScript into a distributed secure programming language.
-
Mobile App Privacy — You’re Doing It Wrong (and So Am I)
Graham Lee advices on how to create an user experience that properly deals with privacy and, in some respect, security issues in mobile applications.
-
Security vs. Security Architecture
Marc Stiegler presents popular but faulty security architectures used - Independence Day Evil Alien Architecture, the Gilded Cage, and Gone Phishin' – along with effective architectures emerging today
-
Securing the Social Web by Moving Beyond Client-Server Security
Tyler Close considers that the old client-server security model is no longer viable and a new security web model is needed, presenting tools and techniques to secure the social web apps of today.
-
From E to EcmaScript and Back Again
Mark Miller on how E and Caja influenced the EcmaScript 5 standard so it can be a secure language, enabling the creation of safe mashups, and how Dr. SES enables secure distributed computing.
-
SOA Security in Practice
Nicolai M. Josuttis discusses various issues encountered when implementing SOA security: heterogeneity and debugging are problematic, ESB plays an important role, and costs involved.
-
The Problem(s) with the Browser
Collin Jackson discusses ways to enforce browser session security against threats such as Cross-Site Request Forgery and various network attacks by using Local Storage and Strict Transport Security.
-
SOA Threat Modeling: Attacking and Defending REST, XML and SOAP-based Services
Jason Macy details the basic requirements for security testing and SOA gateway, attack examples and countermeasures to protect against SQL Injection, DoS, XSD Mutation, and Identity type of attacks.
-
Enterprise SOA Security
Dirk Krafzig presents general aspects of implementing SOA security using a token and role-based approach rather than session and application-based access to resources, including organizational issues.
-
Introduction to Spring Security 3/3.1
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
-
Architecting the Ultimate Control-Point-Advanced Cyber-Threat Mitigation
Blake Dournaee presents Intel’s Service Gateway, a security control point meant to secure on-premise and in the cloud .NET/Java-based web services from various security threats.
-
Does REST Need Middleware?
Bill Burke shows how to use REST to create interfaces to middleware services – messaging, transactions, workflow, security – in order to have RESTful enterprise SOA implementations.