-
4
-
-
84966392358
-
-
For containers, security is problem #1. http://www. networkworld. com/ article/2921006/network-storage/for-containers-security-is-problem-1. html.
-
For Containers, Security is Problem #1
-
-
-
5
-
-
84966392354
-
-
Grsecurity. https://grsecurity. net.
-
-
-
-
7
-
-
84966393850
-
-
Ossec. http://www. ossec. net/.
-
-
-
-
8
-
-
84966357490
-
-
Selinux. http://selinuxproject. org/page/Mainn Page.
-
-
-
-
9
-
-
84966397706
-
-
Smack. http://en. wikipedia. org/wiki/Smack.
-
-
-
-
10
-
-
84966309903
-
-
Tomoyo. http://tomoyo. osdn. jp/.
-
-
-
-
11
-
-
84966442214
-
-
Cloud foundry foundation, 2014. http://cloudfoundry. org/ cloud-foundry-foundation-launch. html.
-
(2014)
Cloud Foundry Foundation
-
-
-
12
-
-
84966442218
-
-
Docker : Vulnerability statistics, 2014. http://www. cvedetails. com/ product/28125/Docker-Docker. html?vendor id=13534.
-
(2014)
Docker : Vulnerability Statistics
-
-
-
13
-
-
84969835729
-
-
Docker image insecurity, 2014. https://titanous. com/posts/ docker-insecurity.
-
(2014)
Docker Image Insecurity
-
-
-
16
-
-
84966398795
-
-
Apparmor, 2015. http://wiki. Apparmor. net/index. php/Main Page.
-
(2015)
-
-
-
17
-
-
84966269557
-
-
Application security on cloud, 2015. http://www. ibm. com/marketplace/ cloud/application-security-on-cloud/us/en-us.
-
(2015)
Application Security on Cloud
-
-
-
18
-
-
84966453654
-
-
Docker, inc.
-
Docker, inc., 2015. www. docker. com.
-
(2015)
-
-
-
19
-
-
84966397727
-
IBM security solutions architecture for network, server and endpoint
-
A. Buecker, K. Browne, L. Foss, J. Jacobs, V. Jeremic, C. Lorenz, C. Stabler, J. Van Herzele, and I. Redbooks. IBM Security Solutions Architecture for Network, Server and Endpoint. IBM redbooks. IBM Redbooks, 2011.
-
(2011)
IBM Redbooks. IBM Redbooks
-
-
Buecker, A.1
Browne, K.2
Foss, L.3
Jacobs, J.4
Jeremic, V.5
Lorenz, C.6
Stabler, C.7
Van Herzele, J.8
Redbooks, I.9
-
24
-
-
84923686283
-
An updated performance comparison of virtual machines and linux containers
-
W. Felter, A. Ferreira, R. Rajamony, and J. Rubio. An updated performance comparison of virtual machines and linux containers. Technology, 28:32, 2014.
-
(2014)
Technology
, vol.28
, pp. 32
-
-
Felter, W.1
Ferreira, A.2
Rajamony, R.3
Rubio, J.4
-
25
-
-
60749123977
-
The evolution of systemcall monitoring
-
IEEE
-
S. Forrest, S. Hofmeyr, and A. Somayaji. The evolution of systemcall monitoring. In Computer Security Applications Conference, 2008. ACSAC 2008. Annual, pages 418-430. IEEE, 2008.
-
(2008)
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
, pp. 418-430
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
29
-
-
84926444656
-
Docker: Lightweight linux containers for consistent development and deployment
-
D. Merkel. Docker: lightweight linux containers for consistent development and deployment. Linux Journal, 239(2), 2014.
-
(2014)
Linux Journal
, vol.239
, Issue.2
-
-
Merkel, D.1
-
30
-
-
84878346861
-
Improving host security with system call policies
-
N. Provos. Improving host security with system call policies. In USENIX Security, volume 3, 2003.
-
(2003)
USENIX Security
, vol.3
-
-
Provos, N.1
-
33
-
-
84958984156
-
Undermining an anomalybased intrusion detection system using common exploits
-
Springer
-
K. M. Tan, K. S. Killourhy, and R. A. Maxion. Undermining an anomalybased intrusion detection system using common exploits. In Recent Advances in Intrusion Detection, pages 54-73. Springer, 2002.
-
(2002)
Recent Advances in Intrusion Detection
, pp. 54-73
-
-
Tan, K.M.1
Killourhy, K.S.2
Maxion, R.A.3
-
34
-
-
84944335838
-
The Docker Book: Containerization is the new virtualization
-
J. Turnbull. The Docker Book: Containerization is the new virtualization. James Turnbull, 2014.
-
(2014)
James Turnbull
-
-
Turnbull, J.1
-
37
-
-
57349162823
-
Linux security modules: General security support for the linux kernel
-
IEEE Computer Society
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Foundations of Intrusion Tolerant Systems, pages 213-213. IEEE Computer Society, 2003.
-
(2003)
Foundations of Intrusion Tolerant Systems
, pp. 213
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
|