Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing.
Yonghwan KimJahwan KooUng-Mo KimPublished in: HCI (3) (2022)
Keyphrases
- cloud computing
- security issues
- security mechanisms
- identity management
- secure manner
- cloud storage
- computing resources
- cloud computing environment
- data center
- private cloud
- service providers
- big data
- distributed computing
- data management
- computing technologies
- business models
- information security
- trusted computing
- security requirements
- computing platform
- cloud services
- remote attestation
- security protocols
- computer systems
- access control
- data analysis