InfoQ Homepage Presentations A How-to Guide to Security in the PAAS Cloud
A How-to Guide to Security in the PAAS Cloud
Summary
John Field and Shawn McKinney examine the security of a typical Java web application and describe 5 common application security architecture patterns taken from real world customer problems. They show how the implementation of these repeatable security patterns differs between a standalone application and a cloud native application.
Bio
John Field has more than 20 years’ experience in software development, system architectures, and information security. Currently he is a Security Architect for Pivotal Services at EMC, John does cutting edge research and development related to secure software architectures for the PAAS cloud. Shawn McKinney is a software architect, open source IAM evangelist, and Java/LDAP code monkey.
About the conference
This is a one-of-a-kind conference for application developers, solution and data architects: people who develop business applications, create multi-device aware web applications, process vast quantities of enterprise data, design cloud architectures, and manage high performance infrastructure. The sessions are specifically tailored for Developers and Architects using the popular open source Spring IO Projects, Groovy & Grails, Cloud Foundry, RabbitMQ, Redis, Geode, Hadoop and Tomcat technologies. Whether you're building mission-critical web or business applications, crunching huge amounts of distributed data, or designing the next killer cloud native application, SpringOne2GX will keep you up to date with the latest enterprise technology.