Lic-Sec: An enhanced AppArmor Docker security profile generator
Tài liệu tham khảo
Bernstein, 2014, Containers and cloud: From LXC to docker to kubernetes, IEEE Cloud Comput, 1, 81, 10.1109/MCC.2014.51
Martin, 2018, Docker ecosystem–vulnerability analysis, Comput Commun, 122, 30, 10.1016/j.comcom.2018.03.011
Guru, 2019, Survey on docker, Natl J Comput Appl Sci, 2, 5
Williams, 2018, Say goodbye to virtualization for a safer cloud
Caprolu, 2019, Edge computing perspectives: Architectures, technologies, and open security issues, 116
Lin, 2018, A measurement study on linux container security: Attacks and countermeasures, 418
Bélair, 2019, Leveraging kernel security mechanisms to improve container security: a survey, 1
Loukidis-Andreou, 2018, Docker-sec: A fully automated container security enhancement mechanism, 1561
Mattetti, 2015, Securing the infrastructure and the workloads of linux containers, 559
Sandhu, 1994, Access control: principle and practice, IEEE Commun Mag, 32, 40, 10.1109/35.312842
Mayer, 2006
2019
Bui, 2015
Combe, 2016, To docker or not to docker: A security perspective, IEEE Cloud Comput, 3, 54, 10.1109/MCC.2016.100
Bacis, 2015, Dockerpolicymodules: mandatory access control for docker containers, 749
Sun, 2018, Security namespace: making linux security frameworks available to containers, 1423
De Benedictis, 2019, Integrity verification of docker containers for a lightweight cloud environment, Future Gener Comput Syst, 97, 236, 10.1016/j.future.2019.02.026
Sailer, 2004, Design and implementation of a TCG-based integrity measurement architecture., 223
Priedhorsky R, Randles T. Charliecloud: Unprivileged containers for user-defined software stacks in hpc. In Proceedings of the international conference for high performance computing, networking, storage and analysis, 2017, pp. 1–10.
Azab, 2017, Enabling docker containers for high-performance and many-task computing, 279
Chelladhurai, 2016, Securing docker containers from denial of service (dos) attacks, 856
Jian, 2017, A defense method against docker escape attack, 142
Arnautov, 2016, {SCONE}: Secure linux containers with intel {SGX}, 689
Luo, 2016, Whispers between the containers: High-capacity covert channel attacks in docker, 630
Hunger C, Vilanova L, Papamanthou C, Etsion Y, Tiwari M. DATS-data containers for web applications. In Proceedings of the twenty-third international conference on architectural support for programming languages and operating systems, 2018, pp. 722–736.
Hoekstra, 2013, Using innovative instructions to create trustworthy software solutions, HASP@ ISCA, 11, 2487726
Ranjbar, 2017, Synaptic: Secure and persistent connectivity for containers, 262
Kelbert, 2017, Securecloud: Secure big data processing in untrusted clouds, 282
Babar, 2017
Casalicchio, 2020, The state-of-the-art in container technologies: Application, orchestration and security, Concurr Comput: Pract Exper, 10.1002/cpe.5668
Yasrab, 2018
MP, 2016, Enhancing security of docker using linux hardening techniques, 94
Manu, 2016, A study, analysis and deep dive on cloud PAAS security in terms of docker container security, 1
Sultan, 2019, Container security: Issues, challenges, and the road ahead, IEEE Access, 7, 52976, 10.1109/ACCESS.2019.2911732
Lu, 2017, Research of penetration testing technology in docker environment
Duarte, 2018, An empirical study of docker vulnerabilities and of static code analysis applicability, 27
Tunde-Onadele, 2019, A study on container vulnerability exploit detection, 121
Shu R, Gu X, Enck W. A study of security vulnerabilities on docker hub. In Proceedings of the seventh ACM on conference on data and application security and privacy, 2017, pp. 269–280.
Zerouali, 2019, On the impact of outdated and vulnerable javascript packages in docker images, 619
Brady, 2020, Docker container security in cloud computing, 0975
