Sankaran et al., 2020 - Google Patents
Workflow integration alleviates identity and access management in serverless computingSankaran et al., 2020
View PDF- Document ID
- 1694561736197736418
- Author
- Sankaran A
- Datta P
- Bates A
- Publication year
- Publication venue
- Proceedings of the 36th Annual Computer Security Applications Conference
External Links
Snippet
As serverless computing continues to revolutionize the design and deployment of web services, it has become an increasingly attractive target to attackers. These adversaries are developing novel tactics for circumventing the ephemeral nature of serverless functions …
- 238000011156 evaluation 0 description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sankaran et al. | Workflow integration alleviates identity and access management in serverless computing | |
Alpernas et al. | Secure serverless computing using dynamic information flow control | |
Datta et al. | Valve: Securing function workflows on serverless computing platforms | |
Bacon et al. | Information flow control for secure cloud computing | |
Hashizume et al. | An analysis of security issues for cloud computing | |
Wang et al. | Riverbed: Enforcing user-defined privacy constraints in distributed web services | |
Pappas et al. | CloudFence: Data flow tracking as a cloud service | |
Marin et al. | Serverless computing: a security perspective | |
Yeluri et al. | Building the Infrastructure for Cloud Security: A Solutions View | |
Zhang et al. | Citadel: Protecting data privacy and model confidentiality for collaborative learning | |
Will et al. | Intel software guard extensions applications: A survey | |
Mambretti et al. | Trellis: Privilege separation for multi-user applications made easy | |
Chakrabarti et al. | Trusted execution environment with intel sgx | |
Scopelliti et al. | End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs | |
Hunger et al. | DATS-data containers for web applications | |
Khan et al. | Pirax: framework for application piracy control in mobile cloud environment | |
Pramod et al. | Limitations and challenges in cloud-based applications development | |
Zhao et al. | Towards a secure joint cloud with confidential computing | |
Khan et al. | Silver lining: Enforcing secure information flow at the cloud edge | |
Yu et al. | A trusted architecture for virtual machines on cloud servers with trusted platform module and certificate authority | |
Atamli‐Reineh et al. | A framework for application partitioning using trusted execution environments | |
Gremaud et al. | Privacy-preserving IoT cloud data processing using SGX | |
Anupa et al. | Cloud workflow and security: A survey | |
Mustacoglu et al. | Password‐based encryption approach for securing sensitive data | |
Gholami | Security and privacy of sensitive data in cloud computing |