Security assurance requirements for linux application container deployments (original) (raw)

NIST Special Publication 800-190 Application Container Security Guide

Muhammad Salah

View PDFchevron_right

Security Requirements for the Deployment of the Linux Kernel in Enterprise Systems

Hubertus Franke

2001

View PDFchevron_right

Linux Security in Physical, Virtual, and Cloud Environments

Vedran Dakic

Annals of DAAAM for ... & proceedings of the ... International DAAAM Symposium .., 2022

View PDFchevron_right

Comparison between security majors in virtual machine and linux containers

Udit Gupta

ArXiv, 2015

View PDFchevron_right

A review of native container security for running applications

Florent Nolot

Procedia Computer Science, 2020

View PDFchevron_right

CORE CONTAINER SECURITY FRAMEWORKS

IAEME Publication

IAEME PUBLICATION, 2020

View PDFchevron_right

Security recommendations for hypervisor deployment on servers

Ramaswamy Chandramouli

2018

View PDFchevron_right

Security recommendations for server-based hypervisor platforms

Ramaswamy Chandramouli

2018

View PDFchevron_right

Security Best Practices for Containerized Applications

YASH JANI

View PDFchevron_right

The secure software container pattern

Madiha H Syed

2017

View PDFchevron_right

Security Considerations for Virtual Platform Provisioning

C. Gehrmann

2011

View PDFchevron_right

NIST Definition of Microservices, Application Containers and System Virtual Machines

Michaela Iorga

2016

View PDFchevron_right

NIST Security Handbook

Alaa Katlan

View PDFchevron_right

Rule-Based Security Monitoring of Containerized Environments

Christoph Reich

Communications in Computer and Information Science

View PDFchevron_right

Evaluation of vulnerability reproducibility in container-based Cyber Range

RYOTARO NAKATA

ArXiv, 2021

View PDFchevron_right

Analysis of Docker Security

thanh bui

2015

View PDFchevron_right

Security Assurance Requirements for Hypervisor Deployment Features

Ramaswamy Chandramouli

View PDFchevron_right

Emerging Science Journal Provides a New Way to Enhance Security in the Linux Operating System

kiarash aghakhani

View PDFchevron_right

Container Performance and Vulnerability Management for Container Security Using Docker Engine

Tahir Alyas

Security and Communication Networks

View PDFchevron_right

Deploying Secure Distributed Systems: Comparative Analysis of GNS3 and SEED Internet Emulator

Paolo Modesti, Lewis Golightly

Journal of Cybersecurity and Privacy, 2023

View PDFchevron_right

Secure Namespaced Kernel Audit for Containers

Thomas Pasquier

Proceedings of the ACM Symposium on Cloud Computing, 2021

View PDFchevron_right

Container Hardening Through Automated Seccomp Profiling

Manuel Eduardo Correia

Proceedings of the 2020 6th International Workshop on Container Technologies and Container Clouds, 2020

View PDFchevron_right

Kernel-Based Container File Access Control Architecture to Protect Important Application Information

Daesung Lee

Electronics

View PDFchevron_right

Enhancing the Impregnability of Linux Servers

Dr. A. Pathanjali Sastri

View PDFchevron_right

Operational Security Requirements for Large Collaborative Compute Infrastructures

Roy Campbell

2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2006

View PDFchevron_right

A Survey of Security Concepts for Common Operating Environments

Partha Pal

2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

View PDFchevron_right

Rule-based security monitoring of containerized workloads

Christoph Reich

CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science

View PDFchevron_right

Carapace for Intranet Security of Linux Harding

Premchand Ambhore

2015

View PDFchevron_right

IJERT-Provision of Security in Operating Systmes

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

Component-Oriented Access Control for Deployment of Application Services in Containerized Environments

Indrakshi Ray

Cryptology and Network Security, 2016

View PDFchevron_right

On the effectiveness of virtualization-based security

Nick Nikiforakis

2012

View PDFchevron_right

An Introduction to Computer Security: The NIST Handbook

Hồng Việt

View PDFchevron_right

Integrity verification of Docker containers for a lightweight cloud environment

Marco De Benedictis

Future Generation Computer Systems

View PDFchevron_right

Building safe PaaS clouds: A survey on security in multitenant software platforms

Frederic Desprez

Computers & Security, 2012

View PDFchevron_right

Monterey security enhanced architecture project

George Dinolt

Proceedings DARPA Information Survivability Conference and Exposition, 2003

View PDFchevron_right