InfoQ Homepage Security Content on InfoQ
-
The Problem(s) with the Browser
Collin Jackson discusses ways to enforce browser session security against threats such as Cross-Site Request Forgery and various network attacks by using Local Storage and Strict Transport Security.
-
SOA Threat Modeling: Attacking and Defending REST, XML and SOAP-based Services
Jason Macy details the basic requirements for security testing and SOA gateway, attack examples and countermeasures to protect against SQL Injection, DoS, XSD Mutation, and Identity type of attacks.
-
Enterprise SOA Security
Dirk Krafzig presents general aspects of implementing SOA security using a token and role-based approach rather than session and application-based access to resources, including organizational issues.
-
Introduction to Spring Security 3/3.1
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
-
Architecting the Ultimate Control-Point-Advanced Cyber-Threat Mitigation
Blake Dournaee presents Intel’s Service Gateway, a security control point meant to secure on-premise and in the cloud .NET/Java-based web services from various security threats.
-
Does REST Need Middleware?
Bill Burke shows how to use REST to create interfaces to middleware services – messaging, transactions, workflow, security – in order to have RESTful enterprise SOA implementations.
-
Understanding SOA Security Patterns
Jason Hogg discusses web services security obtained through threat modeling based on security design patterns, and explaining a number of such patterns related to processes, services and SOA security.
-
Risk, Lean Development & Profit: Getting Back to Basics
Robert N. Charette talks about challenging assumptions which leads to discovery and innovation, the relationship between risk and profit in Lean, and about the need to master risk management.
-
SOA Governance: Where the Rubber Meets the Runtime
Harold van Aalst addresses SOA governance at runtime by having a tool capable of discovering when rules or policies are broken in order to be able to act on time to limit the potential damage.
-
Security for the Services World
Chris Riley presents security issues threatening service based systems, examining security threats, presenting measures to reduce the risks, and mentioning available security frameworks.
-
Working With Spring Web Flow
Keith Donald discusses controller modules, Ajax events, partial responses, security, data access, lazy-load exceptions, testing, flow design/implementation best practices, and deploying flows.
-
Overview of the Spring 3.0 Web Stack
Keith Donald discusses the Spring 3.0 web stack, key features, demos of Spring MVC, REST support, automatic data conversion, data binding and validation, and the roadmap for the Spring web stack.