Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Security in Cloud-Native Services: A Survey
by
Rosa, Luis
, Theodoropoulos, Theodoros
, Sorokin, Pavel
, Cordeiro, Luis
, Girolamo, Marco Di
, Taleb, Tarik
, Makris, Antonios
, Benzaid, Chafika
, Gray, Peter
, Diego, Ferran
, Tserpes, Konstantinos
, Marin, Eduard
, Barone, Paolo
in
Architecture
/ Automation
/ cloud-native services
/ Containerization
/ Cybersecurity
/ Data integrity
/ features
/ key aspects
/ Security management
/ Software
/ Software development
/ solutions
/ survey
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Security in Cloud-Native Services: A Survey
by
Rosa, Luis
, Theodoropoulos, Theodoros
, Sorokin, Pavel
, Cordeiro, Luis
, Girolamo, Marco Di
, Taleb, Tarik
, Makris, Antonios
, Benzaid, Chafika
, Gray, Peter
, Diego, Ferran
, Tserpes, Konstantinos
, Marin, Eduard
, Barone, Paolo
in
Architecture
/ Automation
/ cloud-native services
/ Containerization
/ Cybersecurity
/ Data integrity
/ features
/ key aspects
/ Security management
/ Software
/ Software development
/ solutions
/ survey
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Security in Cloud-Native Services: A Survey
by
Rosa, Luis
, Theodoropoulos, Theodoros
, Sorokin, Pavel
, Cordeiro, Luis
, Girolamo, Marco Di
, Taleb, Tarik
, Makris, Antonios
, Benzaid, Chafika
, Gray, Peter
, Diego, Ferran
, Tserpes, Konstantinos
, Marin, Eduard
, Barone, Paolo
in
Architecture
/ Automation
/ cloud-native services
/ Containerization
/ Cybersecurity
/ Data integrity
/ features
/ key aspects
/ Security management
/ Software
/ Software development
/ solutions
/ survey
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Security in Cloud-Native Services: A Survey
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process sensitive data that must be protected from unauthorized access. On top of that, the dynamic and scalable nature of cloud-native services makes it difficult to maintain consistent security, as deploying new instances and infrastructure introduces new vulnerabilities. To address these challenges, efficient security solutions are needed to mitigate potential threats while aligning with the characteristics of cloud-native services. Despite the abundance of works focusing on security aspects in the cloud, there has been a notable lack of research that is focused on the security of cloud-native services. To address this gap, this work is the first survey that is dedicated to exploring security in cloud-native services. This work aims to provide a comprehensive investigation of the aspects, features, and solutions that are associated with security in cloud-native services. It serves as a uniquely structured mapping study that maps the key aspects to the corresponding features, and these features to numerous contemporary solutions. Furthermore, it includes the identification of various candidate open-source technologies that are capable of supporting the realization of each explored solution. Finally, it showcases how these solutions can work together in order to establish each corresponding feature. The insights and findings of this work can be used by cybersecurity professionals, such as developers and researchers, to enhance the security of cloud-native services.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.