Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction.
Agathe BlaiseFilippo RebecchiPublished in: CLOUD (2022)
Keyphrases
- key exchange protocol
- attack graph
- authentication mechanism
- security measures
- authentication protocol
- graph representation
- structured data
- graph model
- high resolution
- block cipher
- graph structure
- graph theory
- image reconstruction
- lightweight
- random walk
- weighted graph
- security requirements
- directed graph
- three dimensional
- hash functions
- directed acyclic graph
- secret key
- security mechanisms
- security management
- x ray