Yu et al., 2019 - Google Patents
A survey on security issues in services communication of Microservices‐enabled fog applicationsYu et al., 2019
View PDF- Document ID
- 981582623797770209
- Author
- Yu D
- Jin Y
- Zhang Y
- Zheng X
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
Fog computing is used as a popular extension of cloud computing for a variety of emerging applications. To incorporate various design choices and customized policies in fog computing paradigm, Microservices is proposed as a new software architecture, which is …
- 238000004891 communication 0 title abstract description 50
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | A survey on security issues in services communication of Microservices‐enabled fog applications | |
| Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
| Jangjou et al. | A comprehensive survey on security challenges in different network layers in cloud computing | |
| Modi et al. | A survey on security issues and solutions at different layers of Cloud computing | |
| Singh et al. | A survey on cloud computing security: Issues, threats, and solutions | |
| Rai et al. | Securing software as a service model of cloud computing: Issues and solutions | |
| Kulkarni et al. | A security aspects in cloud computing | |
| Chen et al. | Security, privacy, and digital forensics in the cloud | |
| Lonea et al. | Identity management for cloud computing | |
| Hoang et al. | Security of software-defined infrastructures with SDN, NFV, and cloud computing technologies | |
| Shajan et al. | Survey of security threats and countermeasures in cloud computing | |
| Shibli et al. | Access control as a service in cloud: challenges, impact and strategies | |
| Sharma et al. | Cloud computing risks and recommendations for security | |
| Sánchez et al. | Security issues and threats that may affect the hybrid cloud of FINESCE | |
| Binkowski et al. | Securing 3rd party app integration in docker-based cloud software ecosystems | |
| Akinbi et al. | Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure | |
| Shehab et al. | O-cloud security: a comprehensive survey of threats, mitigation strategies, and future directions | |
| Surya et al. | Security issues and challenges in cloud | |
| Pattaranantakul | Moving towards software-defined security in the era of NFV and SDN | |
| Reece | Multi-cloud identity security utilizing Self-Sovereign Identity | |
| Zwarico | O‐RAN Security | |
| Todorov et al. | AWS Se urity Best Pra ti es | |
| Subhadra | An analysis of data security and privacy for cloud computing | |
| Sandhya | A Study on Various Security Methods in Cloud Computing. | |
| Kuzminykh et al. | Mechanisms of ensuring security in Keystone service |