A Taxonomy of container security on computational clouds: concerns and solutions
نویسندگان
چکیده
منابع مشابه
RFID-enabled Innovative Solutions Promote Container Security
In this paper we address the container security problem and we investigate RFID-enabled innovative solutions to confront it. To that end, initially we set the scene of the problem by reporting existing security problems in ocean container transport and container security-originated initiatives and regulations that affect seaborne containers transportation and handling. Afterwards, we accomplish...
متن کاملSecurity Attacks and Solutions in Clouds
Cloud computing offers great potential to improve productivity and reduce costs, but at the same time it possesses many new security risks. In this paper we identify the possible security attacks on clouds including: Wrapping attacks, Malware-Injection attacks, Flooding attacks, Browser attacks, and also Accountability checking problems. We identify the root causes of these attacks and propose ...
متن کاملthe geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
15 صفحه اولturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista de Informática Teórica e Aplicada
سال: 2019
ISSN: 2175-2745,0103-4308
DOI: 10.22456/2175-2745.86196