Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Viega is active.

Publication


Featured researches published by John Viega.


IEEE Computer | 2009

Cloud Computing and the Common Man

John Viega

The cloud offers several advantages, but until some of its risks are better understood many major players might hold back.


ieee symposium on security and privacy | 2006

Why applying standards to Web services is not enough

John Viega; Jeremy Epstein

Properly designing and securing your Web services application is important, and its not just a matter of using security standards. Developers must understand both the limitations and drawbacks to security standards in order to fully secure their Web services. In this article, we outline the role of security standards in Web services development. We then look at each of these three pitfalls in detail. Finally, we provide some suggestions on how to address standards-based security in a Web application


ieee symposium on security and privacy | 2012

The State of Embedded-Device Security (Spoiler Alert: It's Bad)

John Viega; Hugh Thompson

Embedded-systems security is a mess, and the embedded-software industry needs to start focusing on it. This will involve moving beyond just the technology to rethink our assumptions of how people will actually use and maintain embedded devices.


ieee symposium on security and privacy | 2012

Ten Years On, How Are We Doing? (Spoiler Alert: We Have No Clue)

John Viega

As this magazine closes out its 10th anniversary year, its editor in chief gives the industry a report card for the past decade, both to see how well it did and to set some goals for the next 10 years.


ieee symposium on security and privacy | 2012

Giving Back

John Viega

Editor-in-chief John Viega closes out his term with a discussion about why he served and how other people can get involved to give back to the security community.


IEEE Computer | 2000

Coping with Java programming stress

Roger T. Alexander; James M. Bieman; John Viega


ieee symposium on security and privacy | 2010

Guest Editors' Introduction: Mobile Device Security

John Viega; Bret Michael


ieee symposium on security and privacy | 2012

Cloud Security: Not a Problem

John Viega


ieee symposium on security and privacy | 2011

Ten Years of Trustworthy Computing: Lessons Learned

John Viega


ieee symposium on security and privacy | 2011

Reality Check

John Viega

Collaboration


Dive into the John Viega's collaboration.

Top Co-Authors

Avatar

Bret Michael

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

James M. Bieman

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Roger T. Alexander

Washington State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge