Login / Signup
To Docker or Not to Docker: A Security Perspective.
Théo Combe
Antony Martin
Roberto Di Pietro
Published in:
IEEE Cloud Comput. (2016)
Keyphrases
</>
intrusion detection
access control
information security
network security
security requirements
viewpoint
data security
security problems
database
risk assessment
statistical databases
information assurance
case study
operating system
key management
security level