2019
DOI: 10.1109/tnsm.2018.2889009
|View full text |Cite
|
Sign up to set email alerts
|

Agile Network Access Control in the Container Age

Abstract: Linux Containers, such as those managed by Docker, are an increasingly popular way to package and deploy complex applications. However, the fundamental security primitive of network access control for a distributed microservice deployment is often ignored or left to the network operations team. High-level application-specific security requirements are not appropriately enforced by low-level network access control lists. Apart from coarse-grained separation of virtual networks, Docker neither supports the appli… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 37 publications
(89 reference statements)
0
4
0
Order By: Relevance
“…The final set for review in the original SLR study consisted of the 18 primary studies. They are referenced in this review as [3,12,[29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44]. As our review of the SLR was limited by time and scope, the review started by adopting the result set of the 18 primary studies from the original SLR study.…”
Section: Topic Search Terms Derived From Topics Main Research Topic D...mentioning
confidence: 99%
“…The final set for review in the original SLR study consisted of the 18 primary studies. They are referenced in this review as [3,12,[29][30][31][32][33][34][35][36][37][38][39][40][41][42][43][44]. As our review of the SLR was limited by time and scope, the review started by adopting the result set of the 18 primary studies from the original SLR study.…”
Section: Topic Search Terms Derived From Topics Main Research Topic D...mentioning
confidence: 99%
“…The literature review and related work draw our attention to further research in the possible integration of DevOps, multi-cloud, and IoT applications [50,51]. DevOps adoption for IoT application deployment to multi-cloud requires concrete architecture and guidelines [19,52].…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…General research on configuration synthesis has thrived, yielding, over the past decades, tools to produce configurations for firewalls (e.g., [12,13,17,42,54]), routing (e.g., [4,5,15]), and other networking targets [14,38,44,47]. Some work, such as Bravetti, et al [7] also focuses on microservice synthesis.…”
Section: Related Workmentioning
confidence: 99%