2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) 2016
DOI: 10.1109/iccpct.2016.7530217
|View full text |Cite
|
Sign up to set email alerts
|

Docker container security via heuristics-based multilateral security-conceptual and pragmatic study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Manu et al, have provided unified security and privacy multilateral security architecture for cloud services stack, using key latest technology via LxC in general and Docker containers in specific to help assess the security design and architecture quality using multilateral security framework for Docker container. [9]. They have made a deep dive of the PAAS security and also try to analyze, compare and contrast the PAAS Docker container security, with other container technologies, and also with Virtual machine security with and without Hypervisor, and current security level of Dockers container [10].…”
Section: Security Problems In the Docker Literaturementioning
confidence: 99%
“…Manu et al, have provided unified security and privacy multilateral security architecture for cloud services stack, using key latest technology via LxC in general and Docker containers in specific to help assess the security design and architecture quality using multilateral security framework for Docker container. [9]. They have made a deep dive of the PAAS security and also try to analyze, compare and contrast the PAAS Docker container security, with other container technologies, and also with Virtual machine security with and without Hypervisor, and current security level of Dockers container [10].…”
Section: Security Problems In the Docker Literaturementioning
confidence: 99%
“…For network security, to enhance the container security provides the access control in terms of the communication level. Manu et al [25] design the balanced multilateral security prototype. The proposed architecture applied OSI/TCP/IP model to the cloud service structure.…”
Section: B Dockermentioning
confidence: 99%
“…There are some techniques that we can use to increase the container security, e.g. isolation or communication control [22], [24], [25]. In this paper, we focus on providing the scalable log data saving service for semiconductor testing.…”
Section: The Proposed Solution -Scalable Semiconductor Data Loggermentioning
confidence: 99%
“…a Docker container [9]). Through encapsulation, we achieve a high level of security [3,8]: 3D Apps cannot access the memory space and data of other apps. User isolation guarantees that a separate instance of the application will process each user's data, and after processing, will return the result and be destroyed.…”
Section: Hardware 3dprinterosmentioning
confidence: 99%