Nothing Special   »   [go: up one dir, main page]

Sankaran et al., 2020 - Google Patents

Workflow integration alleviates identity and access management in serverless computing

Sankaran et al., 2020

View PDF
Document ID
1694561736197736418
Author
Sankaran A
Datta P
Bates A
Publication year
Publication venue
Proceedings of the 36th Annual Computer Security Applications Conference

External Links

Snippet

As serverless computing continues to revolutionize the design and deployment of web services, it has become an increasingly attractive target to attackers. These adversaries are developing novel tactics for circumventing the ephemeral nature of serverless functions …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Sankaran et al. Workflow integration alleviates identity and access management in serverless computing
Alpernas et al. Secure serverless computing using dynamic information flow control
Datta et al. Valve: Securing function workflows on serverless computing platforms
Bacon et al. Information flow control for secure cloud computing
Hashizume et al. An analysis of security issues for cloud computing
Wang et al. Riverbed: Enforcing user-defined privacy constraints in distributed web services
Pappas et al. CloudFence: Data flow tracking as a cloud service
Marin et al. Serverless computing: a security perspective
Yeluri et al. Building the Infrastructure for Cloud Security: A Solutions View
Zhang et al. Citadel: Protecting data privacy and model confidentiality for collaborative learning
Will et al. Intel software guard extensions applications: A survey
Mambretti et al. Trellis: Privilege separation for multi-user applications made easy
Chakrabarti et al. Trusted execution environment with intel sgx
Scopelliti et al. End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs
Hunger et al. DATS-data containers for web applications
Khan et al. Pirax: framework for application piracy control in mobile cloud environment
Pramod et al. Limitations and challenges in cloud-based applications development
Zhao et al. Towards a secure joint cloud with confidential computing
Khan et al. Silver lining: Enforcing secure information flow at the cloud edge
Yu et al. A trusted architecture for virtual machines on cloud servers with trusted platform module and certificate authority
Atamli‐Reineh et al. A framework for application partitioning using trusted execution environments
Gremaud et al. Privacy-preserving IoT cloud data processing using SGX
Anupa et al. Cloud workflow and security: A survey
Mustacoglu et al. Password‐based encryption approach for securing sensitive data
Gholami Security and privacy of sensitive data in cloud computing