Results 241 to 250 of about 199,972 (293)
Some of the next articles are maybe not open access.

A penetrationless secure container

Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures, 2003
Secure containers are needed to protect the communication link between a data-gathering instrument and the device used to authenticate that instrument's reports. A container formed by a continuous, penetration-free glass envelope provides a robust solution.
openaire   +1 more source

Containers and Security

2017
Software is deemed to be production ready when it is secure. Security is highly important when dealing with operating systems, which is clearly what LXC provides using system-level containers. The basic idea of Linux containers is to share resources with isolated environments, and this raises a question about security.
openaire   +1 more source

Azure Kubernetes Services: Container Security

2020
In this chapter, you learn the business use case for Azure Kubernetes Services (AKS), understand the fundamentals of containers, and learn how to maintain a secure Kubernetes cluster. You need to understand the underlying container ecosystems and how Kubernetes supports the management of hundreds and thousands of containers.
Marshall Copeland, Matthew Jacobs
openaire   +1 more source

Container Security at Dry Ports

2018
This chapter zooms inwards and addresses maritime/container security at the market located in the hinterland regions. It investigates container security at dry ports and analyses what impact stringent container inspections by the customs will have on associated risks, either with or without apportioning of liability of dry port operators. It introduces
Girish Gujar, Adolf K. Y. Ng, Zaili Yang
openaire   +1 more source

SynAPTIC: Secure and Persistent Connectivity for Containers

2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017
Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints ...
Komu, Miika   +4 more
openaire   +1 more source

A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing

2021
In recent years, container technology has been widely used in cloud computing, so the security monitoring technology for containers has also received widespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected
Zhaofeng Yu   +5 more
openaire   +1 more source

A stochastic game model on container security

2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011
We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and ...
Bakır, Niyazi Onur, Kardeş, E.
openaire   +2 more sources

Security in container-based virtualization through vTPM

Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
Cloud computing is a wide-spread technology that enables the enterprises to provide services to their customers with a lower cost, higher performance, better availability and scalability. However, privacy and security in cloud computing has always been a major challenge to service providers and a concern to its users.
Lauren Samuel   +2 more
openaire   +2 more sources

Integrating security policies via Container Portable Interceptors

Proceedings of the 4th workshop on Reflective and adaptive middleware systems - ARM '05, 2005
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has to provide appropriate hooks and interfaces, and has to meet the requirements of security.
T. Ritter, R. Schreiner, U. Lang
openaire   +1 more source

Conclusions for Container Port Security

2019
The aim of this book was to analyse the impacts of the CSI programme on EU container seaport competition. In order to achieve this aim, five objectives were developed in Chapter 1. Research Objectives 1 and 2 and partial Objectives 3 and 4 were addressed in the literature reviews (Chapters 2 and 3) and conceptual model development process (Chapter 4 ...
Xufan Zhang, Michael Roe
openaire   +1 more source

Home - About - Disclaimer - Privacy