[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Torkura et al., 2017 - Google Patents

Integrating continuous security assessments in microservices and cloud native applications

Torkura et al., 2017

View PDF
Document ID
9951059229858344717
Author
Torkura K
Sukmana M
Meinel C
Publication year
Publication venue
Proceedings of the10th International Conference on Utility and Cloud Computing

External Links

Snippet

Cloud Native Applications (CNA) consists of multiple collaborating microservice instances working together towards common goals. These microservices leverage the underlying cloud infrastructure to enable several properties such as scalability and resiliency. CNA are …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Torkura et al. Integrating continuous security assessments in microservices and cloud native applications
US11303659B2 (en) Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
Chandramouli Microservices-based application systems
Fernandez et al. Building a security reference architecture for cloud systems
Chang et al. Cloud computing adoption framework: A security framework for business clouds
Bonguet et al. A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing
US10574698B1 (en) Configuration and deployment of decoy content over a network
US10812462B2 (en) Session management for mobile devices
WO2018085733A1 (en) Non-intrusive security enforcement for federated single sign-on (sso)
JP2016129037A (en) System and method for application attestation
US12113824B2 (en) Distributed system for autonomous discovery and exploitation of an organization's computing
Beer et al. Adaptive security architecture for protecting RESTful web services in enterprise computing environment
US20210392168A1 (en) Cookie compliance management
US20210200595A1 (en) Autonomous Determination of Characteristic(s) and/or Configuration(s) of a Remote Computing Resource to Inform Operation of an Autonomous System Used to Evaluate Preparedness of an Organization to Attacks or Reconnaissance Effort by Antagonistic Third Parties
Chandramouli et al. Attribute-based access control for microservices-based applications using a service mesh
Torkura et al. Cavas: Neutralizing application and container security vulnerabilities in the cloud native era
Khan et al. A model-driven approach for access control in internet of things (IoT) applications–an introduction to UMLOA
US20240289264A1 (en) Component testing framework
Deshpande et al. Optimization of security as an enabler for cloud services and applications
Yousefnezhad et al. Authentication and access control for open messaging interface standard
Chikhale et al. Security analysis of SDN cloud applications
Sarıkoz An Information security framework for web services in enterprise networks
Ghazizadeh et al. Cloud surfing: A general comparison of cloud identity guidelines
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Beder Trust Management For A Decentralized Service Exposure Marketplace: A Service Exposure Perspective