Results 1 to 10 of about 199,972 (293)
Port Security: Container Cargo Control
illicittrafficking of threat materials, especially explosives, chemicalsubstances and radioactive or nuclear material. The transportof the threat materials by using sea routes is an advantageto te"orists especially because of the possible use of ship ...
Vladivoj Vlaković +2 more
doaj +6 more sources
Research on the trusted environment of container cloud based on the TPCM
Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much ...
Guojie LIU +3 more
doaj +3 more sources
In recent years, the security of containers has become a crucial aspect of modern software applications’ security and integrity. Containers are extensively used due to their lightweight and portable nature, allowing swift and agile deployment across ...
Santosh Ugale, Amol Potgantwar
doaj +1 more source
A secure edge power system based on a Docker container
Thanks to the advantages of low latency, high efficiency, and oneself-security, the edge computing (EC) paradigm is expected to widely be applied in a large number of scenarios.
Xinchen Xu +9 more
doaj +1 more source
Kunerva: Automated Network Policy Discovery Framework for Containers
Containerization has gained significant popularity in cloud-native applications, offering lightweight and portable capabilities, with container orchestration platforms such as Kubernetes, simplifying deployment and management.
Seungsoo Lee, Jaehyun Nam
doaj +1 more source
Leveraging Kernel Security Mechanisms to Improve Container Security [PDF]
Containerization is a lightweight virtualization technique reducing virtualization overhead and deployment latency compared to full VM; its popularity is quickly increasing. However, due to kernel sharing, containers provide less isolation than full VM. Thus, a compromised container may break out of its isolated context and gain root access to the host
Belair, Maxime +2 more
openaire +2 more sources
A Security Isolation System Based on Docker Container Behavior Analysis
The smart grid information platforms now mostly use containers to realize the miniaturization of power services, but the containers interact frequently with the outside, and their performance is fragile, and is prone to be paralyzed and becomes the ...
WANG Jie +4 more
doaj +1 more source
CONTAINER-BASED VIRTUALIZATION FOR BLOCKCHAIN TECHNOLOGY: A SURVEY
Blockchain technology has garnered interest in several scientific and engineering fields. To improve blockchain services, its execution challenges must be addressed.
Nawar A. Sultan, Rawaa Putros Qasha
doaj +1 more source
Security Isolation Strategy Mechanism for Lightweight Virtualization Environment
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian +3 more
doaj +1 more source
CONTAIN4n6: a systematic evaluation of container artifacts
A container provides an environment where applications are packaged and run with the supporting libraries and dependencies. Due to scalability and efficient software deployment, the popularity of container technology has increased and its services are ...
Anand K. Mishra +2 more
doaj +1 more source

