Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

Divds: Docker image vulnerability diagnostic system

S Kwon, JH Lee - IEEE access, 2020 - ieeexplore.ieee.org
Since the development of Docker in 2013, container utilization projects have emerged in
various fields. Docker has the advantage of being able to quickly share application build …

An implementation of high efficient smart street light management system for smart city

YS Yang, SH Lee, GS Chen, CS Yang… - IEEE …, 2020 - ieeexplore.ieee.org
Street light are among the most common infrastructure in cities. Street lights and sensors can
be combined to generate an interface of data collection. The analysis of massive data serves …

[HTML][HTML] Lic-Sec: an enhanced AppArmor Docker security profile generator

H Zhu, C Gehrmann - Journal of Information Security and Applications, 2021 - Elsevier
Along with the rapid development of cloud computing technology, containerization
technology has drawn much attention from both industry and academia. In this paper, we …

[HTML][HTML] Security quantification of container-technology-driven E-government systems

SK Mondal, T Tan, S Khanam, K Kumar, HMD Kabir… - Electronics, 2023 - mdpi.com
With the rapidly increasing demands of e-government systems in smart cities, a myriad of
challenges and issues are required to be addressed. Among them, security is one of the …

[HTML][HTML] High-secured data communication for cloud enabled secure docker image sharing technique using blockchain-based homomorphic encryption

VK Kaliappan, S Yu, R Soundararajan, S Jeon, D Min… - Energies, 2022 - mdpi.com
In recent years, container-based virtualization technology for edge and cloud computing has
advanced dramatically. Virtualization solutions based on Docker Containers provide a more …

Zero trust container architecture (ztca): A framework for applying zero trust principals to docker containers

D Leahy, C Thorpe - … Conference on Cyber Warfare and Security, 2022 - books.google.com
Containerisation is quickly becoming an accepted industry standard for development
environments and Gartner, in a recent market forecast, estimated that by 2022 more than …

A Survey on the Use of Container Technologies in Autonomous Driving and the Case of BeIntelli

B Acar, MG Augusto, M Sterling… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
The application of containerization technology has seen a significant increase in popularity
in recent years, both in the business and scientific sectors. In particular, the ability to create …

[HTML][HTML] Evaluation of software impact designed for biomedical research: Are we measuring what's meaningful?

A Afiaz, AA Ivanov, J Chamberlin, D Hanauer… - ArXiv, 2023 - ncbi.nlm.nih.gov
Software is vital for the advancement of biology and medicine. Through analysis of usage
and impact metrics of software, developers can help determine user and community …

Enabling seamless execution of computational and data science workflows on hpc and cloud with the popper container-native automation engine

J Chakraborty, C Maltzahn… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
The problem of reproducibility and replication in scientific research is quite prevalent to date.
Researchers working in fields of computational science often find it difficult to reproduce …