Torkura et al., 2017 - Google Patents
Integrating continuous security assessments in microservices and cloud native applicationsTorkura et al., 2017
View PDF- Document ID
- 9951059229858344717
- Author
- Torkura K
- Sukmana M
- Meinel C
- Publication year
- Publication venue
- Proceedings of the10th International Conference on Utility and Cloud Computing
External Links
Snippet
Cloud Native Applications (CNA) consists of multiple collaborating microservice instances working together towards common goals. These microservices leverage the underlying cloud infrastructure to enable several properties such as scalability and resiliency. CNA are …
- 230000036541 health 0 abstract description 29
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Torkura et al. | Integrating continuous security assessments in microservices and cloud native applications | |
US11303659B2 (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
Chandramouli | Microservices-based application systems | |
Fernandez et al. | Building a security reference architecture for cloud systems | |
Chang et al. | Cloud computing adoption framework: A security framework for business clouds | |
Bonguet et al. | A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing | |
US10574698B1 (en) | Configuration and deployment of decoy content over a network | |
US10812462B2 (en) | Session management for mobile devices | |
WO2018085733A1 (en) | Non-intrusive security enforcement for federated single sign-on (sso) | |
JP2016129037A (en) | System and method for application attestation | |
US12113824B2 (en) | Distributed system for autonomous discovery and exploitation of an organization's computing | |
Beer et al. | Adaptive security architecture for protecting RESTful web services in enterprise computing environment | |
US20210392168A1 (en) | Cookie compliance management | |
US20210200595A1 (en) | Autonomous Determination of Characteristic(s) and/or Configuration(s) of a Remote Computing Resource to Inform Operation of an Autonomous System Used to Evaluate Preparedness of an Organization to Attacks or Reconnaissance Effort by Antagonistic Third Parties | |
Chandramouli et al. | Attribute-based access control for microservices-based applications using a service mesh | |
Torkura et al. | Cavas: Neutralizing application and container security vulnerabilities in the cloud native era | |
Khan et al. | A model-driven approach for access control in internet of things (IoT) applications–an introduction to UMLOA | |
US20240289264A1 (en) | Component testing framework | |
Deshpande et al. | Optimization of security as an enabler for cloud services and applications | |
Yousefnezhad et al. | Authentication and access control for open messaging interface standard | |
Chikhale et al. | Security analysis of SDN cloud applications | |
Sarıkoz | An Information security framework for web services in enterprise networks | |
Ghazizadeh et al. | Cloud surfing: A general comparison of cloud identity guidelines | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
Beder | Trust Management For A Decentralized Service Exposure Marketplace: A Service Exposure Perspective |