New codingmarks added in the 22nd week of 2018


Octocat **Promotion** - Efficiently manage your coding bookmarks, aka #codingmarks, on www.codingmarks.org and share your hidden gems with the world. They are published weekly on Github. You can help us build THE programming-resources location - Star


New codingmarks added in the 22th week of 2018. Hot topics include:

architecture

Publish–subscribe pattern

In software architecture, publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers, but instead categorize published messages into classes without knowledge of which subscribers, if any, there may be. Similarly, subscribers express interest in one or more classes and only receive messages that are of interest, without knowledge of which publishers, if any, there are.


cryptography

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


Understanding Public Key Cryptography

Probably the best article to understand public key cryptography


Cryptography and IT Security

All you need to know about cryptography. Master ciphers and IT security with Crypto-IT website.


RSA Signing and Encryption in Java

Shows with Java examples the following:

  • Generating key pairs in Java
  • Encryption / Decryption
  • Sign / Verify
  • Java KeyStore

email

Understanding Public Key Cryptography

Probably the best article to understand public key cryptography


glossary

Publish–subscribe pattern

In software architecture, publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers, but instead categorize published messages into classes without knowledge of which subscribers, if any, there may be. Similarly, subscribers express interest in one or more classes and only receive messages that are of interest, without knowledge of which publishers, if any, there are.


java

RSA Signing and Encryption in Java

Shows with Java examples the following:

  • Generating key pairs in Java
  • Encryption / Decryption
  • Sign / Verify
  • Java KeyStore

javascript

Interactive JavaScript charts for your webpage

Highcharts - Interactive JavaScript charts for your web pages.


pki

Understanding Public Key Cryptography

Probably the best article to understand public key cryptography


publish-subscribe

Confidentiality-Preserving Publish/Subscribe: a Survey

Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of the data rather than on pre-established communication channels. It is a natural fit for deployment in untrusted environments such as public clouds linking applications across multiple sites. However, pub/sub in untrusted environments lead to major confidentiality concerns stemming from the content-centric nature of the communications. This survey classifies and analyzes different approaches to confidentiality preservation for pub/sub, from applications of trust and access control models to novel encryption techniques. It provides an overview of the current challenges posed by confidentiality concerns and points to future research directions in this promising field.


Publish-Subscribe Threat Modeling – Security Compass

The decoupled multicast nature of many-to-many communications in the Publish-Subscribe pattern introduces the system components to threats such as unwanted traffic flooding, node compromise attacks, data tampering, privacy violation, and so on. We have identified the potential risks based on Microsoft’s STRIDE model. Figure 2 relates STRIDE threats to possible attacks and potential solutions in a Publish-Subscribe ecosystem.


Publish–subscribe pattern

In software architecture, publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers, but instead categorize published messages into classes without knowledge of which subscribers, if any, there may be. Similarly, subscribers express interest in one or more classes and only receive messages that are of interest, without knowledge of which publishers, if any, there are.


rfc

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


security

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


Cryptography and IT Security

All you need to know about cryptography. Master ciphers and IT security with Crypto-IT website.


Confidentiality-Preserving Publish/Subscribe: a Survey

Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of the data rather than on pre-established communication channels. It is a natural fit for deployment in untrusted environments such as public clouds linking applications across multiple sites. However, pub/sub in untrusted environments lead to major confidentiality concerns stemming from the content-centric nature of the communications. This survey classifies and analyzes different approaches to confidentiality preservation for pub/sub, from applications of trust and access control models to novel encryption techniques. It provides an overview of the current challenges posed by confidentiality concerns and points to future research directions in this promising field.


Publish-Subscribe Threat Modeling – Security Compass

The decoupled multicast nature of many-to-many communications in the Publish-Subscribe pattern introduces the system components to threats such as unwanted traffic flooding, node compromise attacks, data tampering, privacy violation, and so on. We have identified the potential risks based on Microsoft’s STRIDE model. Figure 2 relates STRIDE threats to possible attacks and potential solutions in a Publish-Subscribe ecosystem.


RSA Signing and Encryption in Java

Shows with Java examples the following:

  • Generating key pairs in Java
  • Encryption / Decryption
  • Sign / Verify
  • Java KeyStore

Web security

The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.


Common Phishing Scams and How to Recognize and Avoid them

  • published on:  2018-04-28
  • tags:   security

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.


web

Web security

The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.


x509

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


Adrian Matei

Adrian Matei
Life force expressing itself as a coding capable human being

New codingmarks published in week 48 of 2018

New codingmarks published in week 48 of 2018. Keywords: android, angular, api, documentation, feign, graphql, http, http-client, http2, https, java, kotlin, mapper, mapping, odata, rest, rest-client, spring, spring-boot and swagger Continue reading

New codingmarks published in week 46 of 2018

Published on November 20, 2018

New codingmarks published in week 45of 2018

Published on November 13, 2018