InfoQ Homepage Security Content on InfoQ
-
Introduction to Spring Security 3/3.1
Mike Wiesner demoes using Spring Security 3 with its new features, such as expression language-based authorization and extensions, to implement authentication and authorization in Java applications.
-
Architecting the Ultimate Control-Point-Advanced Cyber-Threat Mitigation
Blake Dournaee presents Intel’s Service Gateway, a security control point meant to secure on-premise and in the cloud .NET/Java-based web services from various security threats.
-
Does REST Need Middleware?
Bill Burke shows how to use REST to create interfaces to middleware services – messaging, transactions, workflow, security – in order to have RESTful enterprise SOA implementations.
-
Understanding SOA Security Patterns
Jason Hogg discusses web services security obtained through threat modeling based on security design patterns, and explaining a number of such patterns related to processes, services and SOA security.
-
Risk, Lean Development & Profit: Getting Back to Basics
Robert N. Charette talks about challenging assumptions which leads to discovery and innovation, the relationship between risk and profit in Lean, and about the need to master risk management.
-
SOA Governance: Where the Rubber Meets the Runtime
Harold van Aalst addresses SOA governance at runtime by having a tool capable of discovering when rules or policies are broken in order to be able to act on time to limit the potential damage.
-
Security for the Services World
Chris Riley presents security issues threatening service based systems, examining security threats, presenting measures to reduce the risks, and mentioning available security frameworks.
-
Working With Spring Web Flow
Keith Donald discusses controller modules, Ajax events, partial responses, security, data access, lazy-load exceptions, testing, flow design/implementation best practices, and deploying flows.
-
Overview of the Spring 3.0 Web Stack
Keith Donald discusses the Spring 3.0 web stack, key features, demos of Spring MVC, REST support, automatic data conversion, data binding and validation, and the roadmap for the Spring web stack.
-
Failure: An Illustrated Guide
Avi Bryant explains the iterative process that led to the concept, implementation, and UI of Trendly (http://trendly.com/ ), using Smalltalk, Javascript, Ruby and Java in the process.
-
When it Just HAS to Work
This talk gives practical tips for adopting an agile approach to planning, team interactions and risk management. When the culture shifts, teams achieve goals sooner and safety is greatly enhanced.
-
Securing A Cloud Infrastructure
George Reese discusses the number one challenge faced by cloud computing - security. He discusses transparency, credential management, and identity management among other topics.