The state‐of‐the‐art in container technologies: Application, orchestration and security
E Casalicchio, S Iannucci - Concurrency and Computation …, 2020 - Wiley Online Library
Containerization is a lightweight virtualization technology enabling the deployment and
execution of distributed applications on cloud, edge/fog, and Internet‐of‐Things platforms …
execution of distributed applications on cloud, edge/fog, and Internet‐of‐Things platforms …
A secure container deployment strategy by genetic algorithm to defend against co-resident attacks in cloud computing
Linux container mechanism is constantly gaining ground in the virtualization landscape as a
lightweight and efficient alternative to hypervisor-based Virtual Machine (VM). Lightweight …
lightweight and efficient alternative to hypervisor-based Virtual Machine (VM). Lightweight …
{SimEnc}: A {High-Performance}{Similarity-Preserving} Encryption Approach for Deduplication of Encrypted Docker Images
Encrypted Docker images are becoming increasingly popular in Docker registries for
privacy. As the Docker registry is tasked with managing an increasing number of images, it …
privacy. As the Docker registry is tasked with managing an increasing number of images, it …
[PDF][PDF] Performance Analysis of an Hyperconverged Infrastructure using Docker Containers and GlusterFS.
R Leite, P Solís, E Alchieri - CLOSER, 2019 - scitepress.org
The adoption of hyperconverged infrastructures is a trend in datacenters, because it merges
different type of computing and storage resources. Hyperconverged infrastructures use …
different type of computing and storage resources. Hyperconverged infrastructures use …
Optimizing docker image encryption—tradeoff between performance and protection level
One example method includes inserting a signal layer in an image, the signal layer
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …
Write-only limited-read filesystem
A secure filesystem provides write-only access with limited read. The filesystem stores data
as an encrypted block on a user machine using a symmetric (active) key, along with …
as an encrypted block on a user machine using a symmetric (active) key, along with …
System for securing software containers with embedded agent
A Gerebe, R Osnat - US Patent 11,762,986, 2023 - Google Patents
A computer-implemented method of providing security for a software container, according to
an example of the present disclosure includes, receiving a software container image with a …
an example of the present disclosure includes, receiving a software container image with a …
[PDF][PDF] A Review of Edge Computing Nodes based on the Internet of Things.
Y Dong, J Bai, X Chen - IoTBDS, 2020 - scitepress.org
Due to the limitations of resources on the IoT device side, it is necessary to provide users
with services not only by means of a long-distance cloud computing center node, but also by …
with services not only by means of a long-distance cloud computing center node, but also by …
Optimizing docker image encryption-tradeoff between performance and protection level
One example method includes inserting a signal layer in an image, the signal layer
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …
indicating that a sensitive layer in the image is a candidate for encryption, creating a single …
Optimizing container image encryption
2020-09-18 Assigned to EMC IP Holding Company LLC reassignment EMC IP Holding
Company LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …
Company LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …