Results 1 to 10 of about 21,516 (235)

Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study [PDF]

open access: yesSensors, 2023
Security is a significant priority for cloud-native systems, regardless of the system size and complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect the system from exploitation by potential adversaries. There is an
Md Shahidur Rahaman   +3 more
doaj   +2 more sources

Cloud-Native Workload Orchestration at the Edge: A Deployment Review and Future Directions [PDF]

open access: yesSensors, 2023
Cloud-native computing principles such as virtualization and orchestration are key to transferring to the promising paradigm of edge computing. Challenges of containerization, operative models and scarce availability of established tools make a thorough ...
Rafael Vaño   +4 more
doaj   +2 more sources

Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study [PDF]

open access: yesSensors, 2023
Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism.
Md Shahidur Rahaman   +3 more
doaj   +2 more sources

A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats [PDF]

open access: yesSensors
Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and trust-centric
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
doaj   +2 more sources

Cloud-native distributed genomic pileup operations. [PDF]

open access: yesBioinformatics, 2023
Abstract Motivation Pileup analysis is a building block of many bioinformatics pipelines, including variant calling and genotyping. This step tends to become a bottleneck of the entire assay since the straightforward pileup implementations involve processing of all base calls from all ...
Wiewiórka M   +3 more
europepmc   +4 more sources

Cloud-native simulation framework for gossip protocol: Modeling and analyzing network dynamics. [PDF]

open access: yesPLoS ONE
This research paper explores the implementation of gossip protocols in cloud native framework through network modeling and simulation analysis. Gossip protocol is known for their decentralized and fault-tolerant nature.
Samsuddin Samsuddin Wira   +3 more
doaj   +2 more sources

Service-Based Architecture for 6G RAN: A Cloud Native Platform That Provides Everything as a Service [PDF]

open access: yesSensors
The 5G network’s commercialization has revealed challenges in providing customized and personalized deployment and services for diverse vertical industrial use cases, leading to high cost, low resource efficiency and management efficiency, and long time ...
Guangyi Liu   +4 more
doaj   +2 more sources

Game Optimization Strategy of Cloud Native Application Resource Scheduling for 5G Network [PDF]

open access: yesJisuanji gongcheng, 2021
The development of 5G network and cloud native technologies has led to the emergence of service-oriented 5G cloud native core networks,and traditional applications are also developing in the cloud native direction.However,the large number of cloud native
ZHAO Wenjun, ZHOU Jinhe, WANG Jing
doaj   +1 more source

eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond)

open access: yesIEEE Access, 2023
Modern mobile communication networks and new service applications are deployed on cloud-native platforms. Kubernetes (K8s) is the de facto distributed operating system for container orchestration, and the extended version of the Berkeley Packet Filter ...
David Soldani   +8 more
doaj   +1 more source

6G Cloud-Native System: Vision, Challenges, Architecture Framework and Enabling Technologies

open access: yesIEEE Access, 2022
Every generation of wireless technologies needs to bring a set of new system capabilities to enable future applications and services, the sixth generation mobile system (6G) is no exception.
Qian Li   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy