Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
Container technologies for arm architecture: A comprehensive survey of the state-of-the-art
Container technology is becoming increasingly popular as an alternative to traditional virtual
machines because it provides a faster, lighter, and more portable runtime environment for …
machines because it provides a faster, lighter, and more portable runtime environment for …
Container security: Issues, challenges, and the road ahead
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …
microservice architecture support. The value of the container market is expected to reach 2.7 …
Understanding the security risks of docker hub
Docker has become increasingly popular because it provides efficient containers that are
directly run by the host kernel. Docker Hub is one of the most popular Docker image …
directly run by the host kernel. Docker Hub is one of the most popular Docker image …
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …
development, deployment, and operation across various platforms. However, the growing …
SysFlow: Toward a programmable zero trust framework for system security
Zero Trust, as an emerging trend of cybersecurity paradigms in modern infrastructure (eg,
enterprise, cloud, edge, IoT, and 5G), is moving security defenses from static and perimeter …
enterprise, cloud, edge, IoT, and 5G), is moving security defenses from static and perimeter …
[HTML][HTML] Lic-Sec: an enhanced AppArmor Docker security profile generator
H Zhu, C Gehrmann - Journal of Information Security and Applications, 2021 - Elsevier
Along with the rapid development of cloud computing technology, containerization
technology has drawn much attention from both industry and academia. In this paper, we …
technology has drawn much attention from both industry and academia. In this paper, we …
[HTML][HTML] SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection
Container technology has become a popular development that can conveniently accelerate
building, running, and sharing applications. However, a container image packaging a …
building, running, and sharing applications. However, a container image packaging a …
A review of security issues and solutions for precision health in Internet-of-Medical-Things systems
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …
Vulnerability analysis and security research of docker container
J Wenhao, L Zheng - 2020 IEEE 3rd International Conference …, 2020 - ieeexplore.ieee.org
Docker is an open source application container engine that enables users to pack
applications and rely on packages to portable containers. However, Docker also has …
applications and rely on packages to portable containers. However, Docker also has …