Security in Cloud-Native Services: A Survey
T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
The world with future technologies (Post-COVID-19): open issues, challenges, and the road ahead
AVS Madhav, AK Tyagi - Intelligent Interactive Multimedia Systems for e …, 2022 - Springer
Over the past few months, we faced a serious pandemic throughout the world that shuts
down the entire country for several weeks at a time. Employees belonging to different …
down the entire country for several weeks at a time. Employees belonging to different …
Kubernetes as a standard container orchestrator-a bibliometric analysis
C Carrión - Journal of Grid Computing, 2022 - Springer
Container orchestration systems simplify the deployment and maintenance of container-
based applications, but developing efficient and well-defined orchestration systems is a …
based applications, but developing efficient and well-defined orchestration systems is a …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study
A Chatterjee, A Prinz - Sensors, 2022 - mdpi.com
In this study, we implemented an integrated security solution with Spring Security and
Keycloak open-access platform (SSK) to secure data collection and exchange over …
Keycloak open-access platform (SSK) to secure data collection and exchange over …
Service mesh and ebpf-powered microservices: A survey and future directions
MRS Sedghpour, P Townend - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Modern software development practice has seen a profound shift in architectural design,
moving from monolithic approaches to distributed, microservice-based architectures. This …
moving from monolithic approaches to distributed, microservice-based architectures. This …
Api security in large enterprises: Leveraging machine learning for anomaly detection
Large enterprises offer thousands of micro-services applications to support their daily
business activities by using Application Programming Interfaces (APIs). These applications …
business activities by using Application Programming Interfaces (APIs). These applications …
Accelerate the development of a business without losing privacy with the help of API Security Best Practises-Enabling businesses to create more dynamic applications
VV Vegesna - International Journal of Management, Technology …, 2022 - papers.ssrn.com
APIs are a strategic necessity to give your business the agility, innovation and speed
needed to succeed in today's business environment. However, the financial incentive …
needed to succeed in today's business environment. However, the financial incentive …
[HTML][HTML] S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud
In cloud services, the zero-trust security paradigm has emerged as a key strategy to reduce
the large attack surface created by the complexity of cloud systems. Service mesh is a …
the large attack surface created by the complexity of cloud systems. Service mesh is a …
Towards secure and leak-free workflows using microservice isolation
Companies like Netflix increasingly use the cloud to deploy their business processes. Those
processes often involve partnerships with other companies, and can be modeled as …
processes often involve partnerships with other companies, and can be modeled as …