Security in Cloud-Native Services: A Survey
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
[HTML][HTML] Secure software development and testing: A model-based methodology
Modern industries widely rely upon software and IT services, in a context where cybercrime
is rapidly spreading in more and more sectors. Unfortunately, despite greater general …
is rapidly spreading in more and more sectors. Unfortunately, despite greater general …
[PDF][PDF] Security and Compliance in Parallel Computing Cloud Services
S Tatineni - International Journal of Science and Research (IJSR), 2023 - researchgate.net
Cloud computing, generally based on the internet environment, gives payment-based and
on-demand access to usage for shared network resources. It provides users with an …
on-demand access to usage for shared network resources. It provides users with an …
A devsecops-based assurance process for big data analytics
Today big data pipelines are increasingly adopted by service applications representing a
key enabler for enterprises to compete in the global market. However, the management of …
key enabler for enterprises to compete in the global market. However, the management of …
Securing CI/CD Pipeline: Automating the detection of misconfigurations and integrating security tools
M Mangla - 2023 - norma.ncirl.ie
In recent years, the adoption of DevOps technology has become widespread in enterprises
and private sectors. DevOps emphasizes communication and collaboration between …
and private sectors. DevOps emphasizes communication and collaboration between …
A Novel DevSecOps Model for Robust Security in an MQTT Internet of Things
M Ekoramaradhya, C Thorpe - International Conference on …, 2022 - books.google.com
Message Queuing Telemetry Transport (MQTT) is a standard messaging protocol for the
Internet of Things (IoT). Among the various communication protocols used in IoT, MQTT …
Internet of Things (IoT). Among the various communication protocols used in IoT, MQTT …
Multivocal Literature Review on the Security of DevSecOp
Z Kanstantsin - Asian Journal of Research in Computer …, 2022 - publish7promo.com
DevOps revolutionize the software development lifecycle by providing agile and fast-paced
solutions. DevOps ignores security prospects since it focuses only on increasing …
solutions. DevOps ignores security prospects since it focuses only on increasing …
A Quantitative DevSecOps Assessment Framework for Cloud-Based Web Microservices
JY Zhang - 2024 - search.proquest.com
The widespread adoption of Cloud-Based Web Microservices (CBWMs), combined with the
implementation of DevSecOps (Development, Security, and Operation) methodologies …
implementation of DevSecOps (Development, Security, and Operation) methodologies …
[PDF][PDF] Privacy in Critical Infrastructure
PDERV Rughiniș, EIM Stan - docs.upb.ro
With the development of the spectrum of online services and the massive migration of the
masses, voluntary or forced by major global contexts, towards a digital interaction, the …
masses, voluntary or forced by major global contexts, towards a digital interaction, the …
[PDF][PDF] TEZĂ DE DOCTORAT Confidențialitatea datelor în infrastructuri critice
RV Rughiniș, IM Stan - docs.upb.ro
Odată cu lărgirea spectrului de servicii online și migrarea masivă a maselor, voluntară sau
forțată de contexte globale majore, către o interacțiune digitală, perspectiva …
forțată de contexte globale majore, către o interacțiune digitală, perspectiva …