Filters








2 Hits in 3.3 sec

Containers' Security: Issues, Challenges, and Road Ahead

Sari Sultan, Imtiaz Ahmad, Tassos Dimitriou
2019 IEEE Access  
We hope that our analysis will help researchers understand container security requirements and obtain a clearer picture of possible vulnerabilities and attacks.  ...  The use cases include: (I) protecting a container from applications inside it, (II) inter-container protection, (III) protecting the host from containers, and (IV) protecting containers from a malicious  ...  [56] presented an automated system to enhance Docker container security that is based on AppArmor LSM called Docker-sec. Docker-sec includes VOLUME 7, 2019 two primary mechanisms.  ... 
doi:10.1109/access.2019.2911732 fatcat:kvnb7irv3jgw3mudefrvyyebqi

SECURE MICROSERVICES - A REVIEW APPLYING THE THEORY OF THE CONSOLIDATED META-ANALYTIC APPROACH

2020 IADIS International Journal on WWW/Internet  
From a base of 837 Scopus papers, some of the main facts found through the analysis of bibliographic metadata were that the authors of greatest influence are M. Fowler, S. Newman, R. Buyya, Y.  ...  The goal of this paper is to address the relevance of applying microservice based system architecture, with an emphasis on the challenges of implementing security in this model.  ...  ACKNOWLEDGEMENT The authors would like to thank the support of the Office of Institutional Security of the Presidency of the Republic (TED 002/2017).  ... 
doi:10.33965/ijwi_202018205 fatcat:iawar3x4ojfsddqzznpijemymm