최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기사물인터넷융복합논문지 = Journal of internet of things and convergence, v.9 no.3, 2023년, pp.21 - 26
고성재 (씨엠티정보통신) , 김선집 (한세대학교 ICT 융합학과)
The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container tec...
M.H.Park, D.H.Kim, H.S.Han and Y.J.Lee, "Server?Workload Security Trends in Cloud Environments,"?Korea Institute of Information Security and Cryptology,?Vol.31, No.3, pp.39-44, 2021.
B.Tak, "A Study on the Security Vulnerabilities of?Container Images," The Journal of Korean Institute of?Next Generation Computing, Vol.14, No.3, pp.7-15,?2018.
M.S.You, J.H.Kim and S.W.Shin, "Revisiting Security?Landscape of Docker Hub Container Images," The?Journal of Korean institute of communications and?information sciences, Vol.47, No.8, pp.1231-1243, 2022.
L.Rice, Container Security: Fundamental Technology?Concepts that Protect Containerized Applications, 1st?ed., O'Reilly Media, 2020.
B.Kaur, M.Dugr'e, A.Hanna and T.Glatard, "An analysis?of security vulnerabilities in container images for?scientific data analysis," GigaScience, Vol.10, 2021.
M.Souppaya, J.Morello and K.Scarfone, "Application?Container Security Guide," NIST Special Publication?800-190, 2017 September.
Q. Zhang, L.Liu, C.Pu, Q.Dou, L.Wu and W.Zhou, "A?Comparative Study of Containers and Virtual?Machines in Big Data Environment," 2018 IEEE 11th?International Conference on Cloud Computing, 2018.
Aquasec, CVE-2019-5021: Alpine Docker Image 'null?root password' Vulnerability[Internet],?https://blog.aquasec.com/cve-2019-5021-alpine-dock?er-image-vulnerability
S.H. Kim and Y.Han. Kim, "A Structural Analysis of?Argo Workflows for Task Automation in Kubernetes?Environment," The Journal of Korean institute of?communications and information sciences,?pp.910-911, 2021.
National Security Agency, Cybersecurity and Infrastructure?Security Agency, "Kubernetes Hardening Guide,"?Cybersecurity Technical Report, 2022.
M.Slik, Validating the replacement filtering features of?popular alternative admission controllers for Pod?Security Policies[Internet]?https://rp.os3.nl/2020-2021/p76/report.pdf
Container-security-checklist[Internet],?https://github.com/krol3/container-security-checklist
AquaSecurity, Trivy[Internet],?https://github.com/aquasecurity/trivy
Argo Workflow[Internet],?https://argoproj.github.io/argo-workflows/
CNCF Annual Survey 2021[Internet],?https://www.cncf.io/reports/cncf-annual-survey-2021/
CIS Benchmark[Internet],?https://www.cisecurity.org/cis-benchmarks/
Docker [Internet],?https://docs.docker.com/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.