Understanding Security Implications of Using Containers in the Cloud.
Byung-Chul TakCanturk IsciSastry S. DuriNilton BilaShripad NadgowdaJames DoranPublished in: USENIX Annual Technical Conference (2017)
Keyphrases
- access control
- intrusion detection
- information security
- computer security
- cloud computing
- security issues
- network security
- security requirements
- security mechanisms
- computing infrastructure
- sensitive data
- key management
- database systems
- cyber security
- security systems
- security level
- security vulnerabilities
- cloud storage
- information assurance