Converged Architecture Security: Administration Is a Key Concern

Converged architecture systems integrate a substantial amount of existing infrastructure, so security of CA is of utmost importance. When designing the administration model for converged architecture systems, you need to ensure that all elements are … Continue reading Converged Architecture Security: Administration Is a Key Concern

Automated tools for applying formal methods to verify security policy in existing software

I am new to the Formal Methods arena, but I feel I have an educated grasp on its applications. However, I only seem to encounter formal methods as applied to the development process, as the software is created.

I’d like to b… Continue reading Automated tools for applying formal methods to verify security policy in existing software

Security Architecture – Settings to drive UI and Privileges (Rights) – Role-Based, per User-Account

How do large companies implement their security requirements which are centralized and used to drive things people can do (allowed to call a certain web-service, submit an order, etc.) as well as to drive UI (disable buttons, menu options,… Continue reading Security Architecture – Settings to drive UI and Privileges (Rights) – Role-Based, per User-Account