|
[1] Containerization. https://en.wikipedia.org/wiki/Containerization. [2] Devops. https://en.wikipedia.org/wiki/DevOps. [3] Docker. https://www.docker.com/. [4] Clair. https://coreos.com/clair/docs/latest/. [5] J. C. Wang, W. F. Cheng, H. C. Chen, and H. L. Chien. Benefit of construct in- formation security environment based on lightweight virtualization technology. In 2015 International Carnahan Conference on Security Technology (ICCST), pages 1–4, Sept 2015. [6] A. M. Joy. Performance comparison between linux containers and virtual ma- chines. In 2015 International Conference on Advances in Computer Engineering and Applications, pages 342–346, March 2015. [7] Eric W Biederman and Linux Networx. Multiple instances of the global linux namespaces. In Proceedings of the Linux Symposium, volume 1, pages 101–112. Citeseer, 2006. [8] Paul B Menage. Adding generic process containers to the linux kernel. In Proceedings of the Linux Symposium, volume 2, pages 45–57. Citeseer, 2007. [9] Dirk Merkel. Docker: lightweight linux containers for consistent development and deployment. Linux Journal, 2014(239):2, 2014. [10] Docker hub. https://hub.docker.com/. [11] Namespaces in operation, part 5: User namespace. https://lwn.net/ Articles/532593/. [12] J. Higgins, V. Holmes, and C. Venters. Securing user defined containers for scientific computing. In 2016 International Conference on High Performance Computing Simulation (HPCS), pages 449–453, July 2016. [13] Thanh Bui. Analysis of docker security. CoRR, abs/1501.02967, 2015. [14] Zhiqiang Jian and Long Chen. A defense method against docker escape attack. In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, ICCSP ’17, pages 142–146, New York, NY, USA, 2017. ACM. [15] AmithRajMP,A.Kumar,S.J.Pai,andA.Gopal.Enhancingsecurityofdocker using linux hardening techniques. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pages 94–99, July 2016. [16] Over 30% of official images in docker hub contain high priority security vulner- abilities. https://banyanops.com/blog/analyzing-docker-hub/. [17] J. Chelladhurai, P. R. Chelliah, and S. A. Kumar. Securing docker containers from denial of service (dos) attacks. In 2016 IEEE International Conference on Services Computing (SCC), pages 856–859, June 2016. [18] Representational state transfer. https://en.wikipedia.org/wiki/ Representational_state_transfer. [19] Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, and Ion Stoica. Dominant resource fairness: Fair allocation of multiple resource types. In Nsdi, volume 11, pages 24–24, 2011. [20] J. Kay and P. Lauder. A fair share scheduler. Commun. ACM, 31(1):44–55, January 1988. |