Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

Divds: Docker image vulnerability diagnostic system

S Kwon, JH Lee - IEEE access, 2020 - ieeexplore.ieee.org
Since the development of Docker in 2013, container utilization projects have emerged in
various fields. Docker has the advantage of being able to quickly share application build …

An implementation of high efficient smart street light management system for smart city

YS Yang, SH Lee, GS Chen, CS Yang… - IEEE …, 2020 - ieeexplore.ieee.org
Street light are among the most common infrastructure in cities. Street lights and sensors can
be combined to generate an interface of data collection. The analysis of massive data serves …

[HTML][HTML] Lic-Sec: an enhanced AppArmor Docker security profile generator

H Zhu, C Gehrmann - Journal of Information Security and Applications, 2021 - Elsevier
Along with the rapid development of cloud computing technology, containerization
technology has drawn much attention from both industry and academia. In this paper, we …

Security quantification of container-technology-driven E-government systems

SK Mondal, T Tan, S Khanam, K Kumar, HMD Kabir… - Electronics, 2023 - mdpi.com
With the rapidly increasing demands of e-government systems in smart cities, a myriad of
challenges and issues are required to be addressed. Among them, security is one of the …

High-secured data communication for cloud enabled secure docker image sharing technique using blockchain-based homomorphic encryption

VK Kaliappan, S Yu, R Soundararajan, S Jeon, D Min… - Energies, 2022 - mdpi.com
In recent years, container-based virtualization technology for edge and cloud computing has
advanced dramatically. Virtualization solutions based on Docker Containers provide a more …

Zero trust container architecture (ztca): A framework for applying zero trust principals to docker containers

D Leahy, C Thorpe - … Conference on Cyber Warfare and Security, 2022 - books.google.com
Containerisation is quickly becoming an accepted industry standard for development
environments and Gartner, in a recent market forecast, estimated that by 2022 more than …

A Survey on the Use of Container Technologies in Autonomous Driving and the Case of BeIntelli

B Acar, MG Augusto, M Sterling… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
The application of containerization technology has seen a significant increase in popularity
in recent years, both in the business and scientific sectors. In particular, the ability to create …

Navigating the Landscape of Kubernetes Security Threats and Challenges

S Kampa - Journal of Knowledge Learning and Science …, 2024 - jklst.org
The rise of containerization and the widespread adoption of Kubernetes have revolutionized
the way applications are deployed and managed. This paradigm shift has introduced new …

[HTML][HTML] Evaluation of software impact designed for biomedical research: Are we measuring what's meaningful?

A Afiaz, AA Ivanov, J Chamberlin, D Hanauer… - Ar**v, 2023 - ncbi.nlm.nih.gov
Software is vital for the advancement of biology and medicine. Through analysis of usage
and impact metrics of software, developers can help determine user and community …