Results 231 to 240 of about 199,972 (293)

Precise Evaluation of Transpiration Patterns in Relation to Grain Yield Under Drought Stress in Faba Bean. [PDF]

open access: yesPlant Direct
Scheer L   +7 more
europepmc   +1 more source

Framework to Secure Docker Containers

2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), 2021
Docker is one the key component for application deployment using CI/CD pipelines. Wherever containers are going ot be used, Docker engine is always the first choice but on other hand security of the Docker images using which application is going to be deployed is always a concern.
Manish Kumar Abhishek, D. Rajeswara Rao
openaire   +1 more source

The Container Security Initiative and Ocean Container Threats

Journal of Homeland Security and Emergency Management, 2007
Following the terrorist attacks of September 11, 2001, U.S. policymakers and their international counterparts quickly devised new programs for protecting seaports and the maritime supply chain. This paper focuses on one such program, the U.S. Container Security Initiative, which screens and inspects U.S.-bound ocean shipping containers at foreign ports.
Jon D. Haveman   +3 more
openaire   +1 more source

Securing the Helm: Navigating Container Security in Kubernetes

2022
As Kubernetes continues to dominate the container orchestration landscape, the security of its deployments, particularly through Helm, has become a paramount concern. This review paper explores the multifaceted security challenges inherent in Kubernetes environments, with a specific focus on Helm, a popular package manager that simplifies the ...
openaire   +1 more source

Secure Transport Container Monitoring Protocol with Container Anonymity

2012
Since 9.11 terror attack in the United States, the smart container has attracted the attention because of the efficiency and safety of container freight shipping. In 2007, Lauf and Sauff proposed MASC-ST protocol for securely transmitting sensitive information gathered from sensors equipped in the transport container to a trusted third party that ...
Sung-Woon Lee, Hyunsung Kim
openaire   +1 more source

Container-Level Security Certification of Services

2012
The increasing success of the Service-Oriented Architecture (SOA) paradigm has fostered the implementation of complex services, including business processes, via dynamic selection and composition of remote services providing single functionality. Run-time selection and composition of services require the deployment of high-level security standards for ...
M. Anisetti, C.A. Ardagna, E. Damiani
openaire   +1 more source

Home - About - Disclaimer - Privacy