InfoQ Homepage Security Content on InfoQ
-
Securing the Social Web by Moving Beyond Client-Server Security
Tyler Close considers that the old client-server security model is no longer viable and a new security web model is needed, presenting tools and techniques to secure the social web apps of today.
-
From E to EcmaScript and Back Again
Mark Miller on how E and Caja influenced the EcmaScript 5 standard so it can be a secure language, enabling the creation of safe mashups, and how Dr. SES enables secure distributed computing.
-
SOA Security in Practice
Nicolai M. Josuttis discusses various issues encountered when implementing SOA security: heterogeneity and debugging are problematic, ESB plays an important role, and costs involved.
-
The Problem(s) with the Browser
Collin Jackson discusses ways to enforce browser session security against threats such as Cross-Site Request Forgery and various network attacks by using Local Storage and Strict Transport Security.
-
SOA Threat Modeling: Attacking and Defending REST, XML and SOAP-based Services
Jason Macy details the basic requirements for security testing and SOA gateway, attack examples and countermeasures to protect against SQL Injection, DoS, XSD Mutation, and Identity type of attacks.
-
Enterprise SOA Security
Dirk Krafzig presents general aspects of implementing SOA security using a token and role-based approach rather than session and application-based access to resources, including organizational issues.
-
Introduction to Spring Security 3/3.1
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
-
Architecting the Ultimate Control-Point-Advanced Cyber-Threat Mitigation
Blake Dournaee presents Intel’s Service Gateway, a security control point meant to secure on-premise and in the cloud .NET/Java-based web services from various security threats.
-
Does REST Need Middleware?
Bill Burke shows how to use REST to create interfaces to middleware services – messaging, transactions, workflow, security – in order to have RESTful enterprise SOA implementations.
-
Understanding SOA Security Patterns
Jason Hogg discusses web services security obtained through threat modeling based on security design patterns, and explaining a number of such patterns related to processes, services and SOA security.
-
Risk, Lean Development & Profit: Getting Back to Basics
Robert N. Charette talks about challenging assumptions which leads to discovery and innovation, the relationship between risk and profit in Lean, and about the need to master risk management.
-
SOA Governance: Where the Rubber Meets the Runtime
Harold van Aalst addresses SOA governance at runtime by having a tool capable of discovering when rules or policies are broken in order to be able to act on time to limit the potential damage.