A survey on security issues in services communication of Microservices-enabled fog applications
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A survey on security issues in services communication of Microservices-enabled fog applications
Authors
Keywords
-
Journal
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume -, Issue -, Pages e4436
Publisher
Wiley
Online
2018-02-15
DOI
10.1002/cpe.4436
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- Efficient and Scalable Runtime Monitoring for Cyber–Physical System
- (2018) Xi Zheng et al. IEEE Systems Journal
- Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
- (2018) Travis Boraten et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- (2017) Jiaojiao Jiang et al. IEEE Communications Surveys and Tutorials
- Challenges and Software Architecture for Fog Computing
- (2017) Zijiang Hao et al. IEEE INTERNET COMPUTING
- Fog Computing for the Internet of Things: Security and Privacy Issues
- (2017) Arwa Alrawais et al. IEEE INTERNET COMPUTING
- Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks
- (2017) Ming Tao et al. IEEE NETWORK
- Understanding cloud-native applications after 10 years of cloud computing - A systematic mapping study
- (2017) Nane Kratzke et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle
- (2017) Longhua Guo et al. IEEE Internet of Things Journal
- The Promise of Edge Computing
- (2016) Weisong Shi et al. COMPUTER
- DevOps and Its Practices
- (2016) Liming Zhu et al. IEEE SOFTWARE
- DevOps
- (2016) Christof Ebert et al. IEEE SOFTWARE
- Verifiable Computation over Large Database with Incremental Updates
- (2016) Xiaofeng Chen et al. IEEE TRANSACTIONS ON COMPUTERS
- Docker Cluster Management for the Cloud - Survey Results and Own Solution
- (2016) René Peinl et al. Journal of Grid Computing
- MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
- (2016) Lei Zhang et al. Security and Communication Networks
- A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
- (2016) Jun Wu et al. IEEE Access
- The Design and Architecture of Microservices
- (2016) Alan Sill IEEE Cloud Computing
- Challenges in Delivering Software in the Cloud as Microservices
- (2016) Christian Esposito et al. IEEE Cloud Computing
- Practical Use of Microservices in Moving Workloads to the Cloud
- (2016) David S. Linthicum IEEE Cloud Computing
- The Economics of Microservices
- (2016) Andy Singleton IEEE Cloud Computing
- To Docker or Not to Docker: A Security Perspective
- (2016) Theo Combe et al. IEEE Cloud Computing
- An overview of Fog computing and its security issues
- (2015) Ivan Stojmenovic et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
- (2015) Sheng Wen et al. IEEE TRANSACTIONS ON COMPUTERS
- New Publicly Verifiable Databases with Efficient Updates
- (2015) Xiaofeng Chen et al. IEEE Transactions on Dependable and Secure Computing
- Identity-based chameleon hashing and signatures without key exposure
- (2014) Xiaofeng Chen et al. INFORMATION SCIENCES
- Modeling the Propagation of Worms in Networks: A Survey
- (2013) Yini Wang et al. IEEE Communications Surveys and Tutorials
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- (2013) Zhiyuan Tan et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- New Algorithms for Secure Outsourcing of Modular Exponentiations
- (2013) Xiaofeng Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Secure Deduplication with Efficient and Reliable Convergent Key Management
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Modeling Propagation Dynamics of Social Network Worms
- (2012) Sheng Wen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security in the cloud
- (2010) Gary Anthes COMMUNICATIONS OF THE ACM
- Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks
- (2010) Seung Nam et al. IEEE COMMUNICATIONS LETTERS
- Service-Oriented Computing and Cloud Computing: Challenges and Opportunities
- (2010) Yi Wei et al. IEEE INTERNET COMPUTING
- Toward publicly auditable secure cloud data storage services
- (2010) Cong Wang et al. IEEE NETWORK
- Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures
- (2010) Keijo Haataja et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A survey on security issues in service delivery models of cloud computing
- (2010) S. Subashini et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Man-in-the-Middle Attack to the HTTPS Protocol
- (2009) Franco Callegati et al. IEEE SECURITY & PRIVACY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now