Results 241 to 250 of about 199,972 (293)
Some of the next articles are maybe not open access.
A penetrationless secure container
Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures, 2003Secure containers are needed to protect the communication link between a data-gathering instrument and the device used to authenticate that instrument's reports. A container formed by a continuous, penetration-free glass envelope provides a robust solution.
openaire +1 more source
2017
Software is deemed to be production ready when it is secure. Security is highly important when dealing with operating systems, which is clearly what LXC provides using system-level containers. The basic idea of Linux containers is to share resources with isolated environments, and this raises a question about security.
openaire +1 more source
Software is deemed to be production ready when it is secure. Security is highly important when dealing with operating systems, which is clearly what LXC provides using system-level containers. The basic idea of Linux containers is to share resources with isolated environments, and this raises a question about security.
openaire +1 more source
Azure Kubernetes Services: Container Security
2020In this chapter, you learn the business use case for Azure Kubernetes Services (AKS), understand the fundamentals of containers, and learn how to maintain a secure Kubernetes cluster. You need to understand the underlying container ecosystems and how Kubernetes supports the management of hundreds and thousands of containers.
Marshall Copeland, Matthew Jacobs
openaire +1 more source
Container Security at Dry Ports
2018This chapter zooms inwards and addresses maritime/container security at the market located in the hinterland regions. It investigates container security at dry ports and analyses what impact stringent container inspections by the customs will have on associated risks, either with or without apportioning of liability of dry port operators. It introduces
Girish Gujar, Adolf K. Y. Ng, Zaili Yang
openaire +1 more source
SynAPTIC: Secure and Persistent Connectivity for Containers
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017Cloud virtualization technology is shifting towards light-weight containers, which provide isolated environments for running cloud-based services. The emerging trends such as container-based micro-service architectures and hybrid cloud deployments result in increased traffic volumes between the micro-services, mobility of the communication endpoints ...
Komu, Miika +4 more
openaire +1 more source
2021
In recent years, container technology has been widely used in cloud computing, so the security monitoring technology for containers has also received widespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected
Zhaofeng Yu +5 more
openaire +1 more source
In recent years, container technology has been widely used in cloud computing, so the security monitoring technology for containers has also received widespread attention. To enhance the isolation of containers, cloud service providers usually run containers in different virtual machines. In this environment, in-container security tools can be detected
Zhaofeng Yu +5 more
openaire +1 more source
A stochastic game model on container security
2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and ...
Bakır, Niyazi Onur, Kardeş, E.
openaire +2 more sources
Security in container-based virtualization through vTPM
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016Cloud computing is a wide-spread technology that enables the enterprises to provide services to their customers with a lower cost, higher performance, better availability and scalability. However, privacy and security in cloud computing has always been a major challenge to service providers and a concern to its users.
Lauren Samuel +2 more
openaire +2 more sources
Integrating security policies via Container Portable Interceptors
Proceedings of the 4th workshop on Reflective and adaptive middleware systems - ARM '05, 2005In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has to provide appropriate hooks and interfaces, and has to meet the requirements of security.
T. Ritter, R. Schreiner, U. Lang
openaire +1 more source
Conclusions for Container Port Security
2019The aim of this book was to analyse the impacts of the CSI programme on EU container seaport competition. In order to achieve this aim, five objectives were developed in Chapter 1. Research Objectives 1 and 2 and partial Objectives 3 and 4 were addressed in the literature reviews (Chapters 2 and 3) and conceptual model development process (Chapter 4 ...
Xufan Zhang, Michael Roe
openaire +1 more source

