Security in microservice-based systems: A multivocal literature review

A Pereira-Vale, EB Fernandez, R Monge… - Computers & …, 2021 - Elsevier
Microservices define an architectural style that conceives systems as a suite of modular,
independent and scalable services. While application design is now simpler, designing …

[HTML][HTML] Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Privacy-Preserving Collaborative Learning for Genome Analysis via Secure XGBoost

MS Aldeen, C Zhao, Z Chen, L Fang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Genomic data is usually stored in a decentralized manner among data providers, who
cannot share them publicly due to privacy concerns. A significant technical challenge is to …

Supporting confidential workloads in spire

E Falcão, M Silva, A Luz, A Brito - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The migration of traditional deployment to clouds has driven the need for a more robust
security model, the Zero-Trust model. The application of zero-trust principles addresses …

ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications

M Sauwens, E Heydari Beni, K Jannes… - … , ICSOC 2021, Virtual …, 2021 - Springer
Online software services are often designed as multi-tenant, API-based, microservice
architectures. However, sharing service instances and storing sensitive data in a shared …

Security enhancements and flaws of emerging communication technologies

D Berardi - 2022 - amsdottorato.unibo.it
The multi-faced evolution of network technologies ranges from big data centers to
specialized network infrastructures and protocols for mission-critical operations. For …

Um mecanismo de aprovisionamento de identidades para microsserviços baseado na integridade do ambiente de execução

M Tassyany, R Sarmento, E Falcão… - Simpósio Brasileiro de …, 2021 - sol.sbc.org.br
This work proposes a new mechanism for microservices identity provisioning based on
integrity evidences. The proposed solution relies on the verification of containers' integrity …

Integrating SPIFFE and SCONE to enable universal identity support for confidential workloads.

MSL SILVA - 2021 - dspace.sti.ufcg.edu.br
Software no longer runs on an isolated set of server machines protected using perimeter se-
curity strategies and tools. As companies move to the cloud and edge computing, the …

Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX

L Wu, H Cai, H Li - International Journal of Information Security and …, 2022 - igi-global.com
Cloud storage allows for saving files at an off-site location that is accessible through the
public internet. However, cloud storage suffers from a lack of trust since employees have …