Ugh. Bad rebase.
This commit is contained in:
312
Bibliography.bib
312
Bibliography.bib
@@ -16,18 +16,6 @@
|
||||
urldate = {2023-12-04},
|
||||
}
|
||||
|
||||
@inproceedings{manu2016study,
|
||||
author = {Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
|
||||
booktitle = {2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
|
||||
title = {A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
|
||||
year = {2016},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {1-13},
|
||||
doi = {10.1109/ICCPCT.2016.7530284},
|
||||
urldate = {2023-08-07},
|
||||
}
|
||||
|
||||
@online{bui2015analysis,
|
||||
doi = {10.48550/ARXIV.1501.02967},
|
||||
url = {https://arxiv.org/abs/1501.02967},
|
||||
@@ -40,94 +28,6 @@
|
||||
urldate = {2023-06-02},
|
||||
}
|
||||
|
||||
@inproceedings{wenhao2020vulnerability,
|
||||
author = {Wenhao, Jiang and Zheng, Li},
|
||||
booktitle = {2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
|
||||
title = {Vulnerability Analysis and Security Research of Docker Container},
|
||||
year = {2020},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {354-357},
|
||||
doi = {10.1109/ICISCAE51034.2020.9236837},
|
||||
urldate = {2023-03-10},
|
||||
}
|
||||
|
||||
@article{combe2016docker,
|
||||
author = {Combe, Theo and Martin, Antony and Di Pietro, Roberto},
|
||||
journal = {IEEE Cloud Computing},
|
||||
title = {To Docker or Not to Docker: A Security Perspective},
|
||||
year = {2016},
|
||||
volume = {3},
|
||||
number = {5},
|
||||
pages = {54-62},
|
||||
keywords = {},
|
||||
doi = {10.1109/MCC.2016.100},
|
||||
ISSN = {2325-6095},
|
||||
month = {Sep.},
|
||||
urldate = {2023-11-07},
|
||||
}
|
||||
|
||||
@inproceedings{loukidis2018docker,
|
||||
author = {Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
|
||||
booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
|
||||
title = {Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
|
||||
year = {2018},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {1561-1564},
|
||||
doi = {10.1109/ICDCS.2018.00169},
|
||||
urldate = {2023-01-07},
|
||||
}
|
||||
|
||||
@inproceedings{mp2016enhancing,
|
||||
author = {Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
|
||||
booktitle = {2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
|
||||
title = {Enhancing security of Docker using Linux hardening techniques},
|
||||
year = {2016},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {94-99},
|
||||
doi = {10.1109/ICATCCT.2016.7911971},
|
||||
urldate = {2023-07-25},
|
||||
}
|
||||
|
||||
@article{jogi2017establishing,
|
||||
title = {Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
|
||||
author = {Jogi, Martin},
|
||||
journal = {University of Tartu, Tartu},
|
||||
year = {2017},
|
||||
urldate = {2023-04-06},
|
||||
}
|
||||
|
||||
@article{kaur2014hardening,
|
||||
title = {Hardening OS Identity by Customised Masking Techniques},
|
||||
author = {Kaur, Ratinder and Singh, Maninder},
|
||||
journal = {Thapar University, Punjab, India},
|
||||
year = {2014},
|
||||
urldate = {2023-03-31},
|
||||
}
|
||||
|
||||
@article{zhu2021lic,
|
||||
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
|
||||
journal = {Journal of Information Security and Applications},
|
||||
volume = {61},
|
||||
pages = {102924},
|
||||
year = {2021},
|
||||
issn = {2214-2126},
|
||||
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
|
||||
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
|
||||
author = {Hui Zhu and Christian Gehrmann},
|
||||
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker},
|
||||
urldate = {2023-02-22},
|
||||
}
|
||||
|
||||
@misc{John2020OS,
|
||||
title = {OS Hardening - Making systems more secure},
|
||||
author = {John Ostrowski},
|
||||
year = {2020},
|
||||
urldate = {2023-12-09},
|
||||
}
|
||||
|
||||
@online{containerHistory,
|
||||
title = {The evolution of containers: Docker, Kubernetes and the future},
|
||||
author = {Emily Mell},
|
||||
@@ -144,14 +44,6 @@
|
||||
urldate = {2023-04-07},
|
||||
}
|
||||
|
||||
@online{SIDDARTH201910simple,
|
||||
title = {10 Simple Steps to Harden Your Docker Containers},
|
||||
author = {SIDDARTH SENTHILKUMAR},
|
||||
url = {https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/},
|
||||
year = {2019},
|
||||
urldate = {2023-10-04},
|
||||
}
|
||||
|
||||
@online{LXC,
|
||||
title = {What's LXC?},
|
||||
author = {Linux Containers},
|
||||
@@ -465,14 +357,6 @@
|
||||
urldate = {2023-11-13},
|
||||
}
|
||||
|
||||
@online{vmblogParavirtualization,
|
||||
title = {What Are the Benefits of Paravirtualization?},
|
||||
author = {David Marshall},
|
||||
year = {2019},
|
||||
url = {https://vmblog.com/archive/2019/07/23/what-are-the-benefits-of-paravirtualization.aspx},
|
||||
urldate = {2023-01-26},
|
||||
}
|
||||
|
||||
@online{servermaniaParavirtualization,
|
||||
title = {What is Paravirtualization in Cloud Computing?},
|
||||
author = {Milad Karimyar},
|
||||
@@ -536,30 +420,6 @@
|
||||
urldate = {2023-10-14},
|
||||
}
|
||||
|
||||
@online{Yathi2017Hardening,
|
||||
title = {Hardening Docker containers, images, and host - security toolkit},
|
||||
author = {Yathi Naik},
|
||||
year = {2017},
|
||||
url = {https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit},
|
||||
urldate = {2023-08-04},
|
||||
}
|
||||
|
||||
@online{StackRox2019Docker,
|
||||
title = {Docker Container Security 101: Risks and 33 Best Practices},
|
||||
author = {StackRox},
|
||||
year = {2019},
|
||||
url = {https://www.stackrox.io/blog/docker-security-101/},
|
||||
urldate = {2023-10-15},
|
||||
}
|
||||
|
||||
@online{Marcin2019Hardening,
|
||||
title = {Hardening Docker Quick Tips},
|
||||
author = {Marcin Teodorczyk},
|
||||
year = {2019},
|
||||
url = {https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964},
|
||||
urldate = {2023-08-19},
|
||||
}
|
||||
|
||||
@online{deviceWhitelistController,
|
||||
title = {Device Whitelist Controller},
|
||||
author = {The Linux kernel user’s and administrator’s guide},
|
||||
@@ -626,14 +486,6 @@
|
||||
urldate = {2023-01-25},
|
||||
}
|
||||
|
||||
@online{redhatContainerRuntime,
|
||||
title = {How Kubernetes creates and runs containers: An illustrated guide},
|
||||
author = {Bob Reselman},
|
||||
year = {2022},
|
||||
url = {https://www.redhat.com/architect/how-kubernetes-creates-runs-containers},
|
||||
urldate = {2023-09-08},
|
||||
}
|
||||
|
||||
@online{codemotionContainerImages,
|
||||
title = {Container Images: Technical Refresher and Security Best Practices},
|
||||
author = {Gilad David Maayan},
|
||||
@@ -642,14 +494,6 @@
|
||||
urldate = {2023-10-28},
|
||||
}
|
||||
|
||||
@online{osVirtualizationInfo,
|
||||
title = {OS-Level Virtualization},
|
||||
author = {Vikas Jain, Vibha Goyal, Nitin Kundapur Bhat},
|
||||
year = {2016},
|
||||
url = {https://courses.engr.illinois.edu/cs423/sp2016/lectures/VirtOS.pdf},
|
||||
urldate = {2023-11-18},
|
||||
}
|
||||
|
||||
@online{teimouriOsVirtualizationDefinition,
|
||||
title = {Operating-system-level virtualization},
|
||||
author = {Davoud Teimouri},
|
||||
@@ -1201,3 +1045,159 @@
|
||||
url = {https://nginx.org/en/},
|
||||
urldate = {2024-01-05},
|
||||
}
|
||||
|
||||
inproceedings{manu2016study,
|
||||
author = {Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
|
||||
booktitle = {2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
|
||||
title = {A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
|
||||
year = {2016},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {1-13},
|
||||
doi = {10.1109/ICCPCT.2016.7530284},
|
||||
urldate = {2023-08-07},
|
||||
}
|
||||
|
||||
inproceedings{wenhao2020vulnerability,
|
||||
author = {Wenhao, Jiang and Zheng, Li},
|
||||
booktitle = {2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
|
||||
title = {Vulnerability Analysis and Security Research of Docker Container},
|
||||
year = {2020},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {354-357},
|
||||
doi = {10.1109/ICISCAE51034.2020.9236837},
|
||||
urldate = {2023-03-10},
|
||||
}
|
||||
|
||||
article{combe2016docker,
|
||||
author = {Combe, Theo and Martin, Antony and Di Pietro, Roberto},
|
||||
journal = {IEEE Cloud Computing},
|
||||
title = {To Docker or Not to Docker: A Security Perspective},
|
||||
year = {2016},
|
||||
volume = {3},
|
||||
number = {5},
|
||||
pages = {54-62},
|
||||
keywords = {},
|
||||
doi = {10.1109/MCC.2016.100},
|
||||
ISSN = {2325-6095},
|
||||
month = {Sep.},
|
||||
urldate = {2023-11-07},
|
||||
}
|
||||
|
||||
inproceedings{loukidis2018docker,
|
||||
author = {Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
|
||||
booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
|
||||
title = {Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
|
||||
year = {2018},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {1561-1564},
|
||||
doi = {10.1109/ICDCS.2018.00169},
|
||||
urldate = {2023-01-07},
|
||||
}
|
||||
|
||||
inproceedings{mp2016enhancing,
|
||||
author = {Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
|
||||
booktitle = {2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
|
||||
title = {Enhancing security of Docker using Linux hardening techniques},
|
||||
year = {2016},
|
||||
volume = {},
|
||||
number = {},
|
||||
pages = {94-99},
|
||||
doi = {10.1109/ICATCCT.2016.7911971},
|
||||
urldate = {2023-07-25},
|
||||
}
|
||||
|
||||
article{jogi2017establishing,
|
||||
title = {Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
|
||||
author = {Jogi, Martin},
|
||||
journal = {University of Tartu, Tartu},
|
||||
year = {2017},
|
||||
urldate = {2023-04-06},
|
||||
}
|
||||
|
||||
article{kaur2014hardening,
|
||||
title = {Hardening OS Identity by Customised Masking Techniques},
|
||||
author = {Kaur, Ratinder and Singh, Maninder},
|
||||
journal = {Thapar University, Punjab, India},
|
||||
year = {2014},
|
||||
urldate = {2023-03-31},
|
||||
}
|
||||
|
||||
article{zhu2021lic,
|
||||
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
|
||||
journal = {Journal of Information Security and Applications},
|
||||
volume = {61},
|
||||
pages = {102924},
|
||||
year = {2021},
|
||||
issn = {2214-2126},
|
||||
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
|
||||
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
|
||||
author = {Hui Zhu and Christian Gehrmann},
|
||||
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker},
|
||||
urldate = {2023-02-22},
|
||||
}
|
||||
|
||||
misc{John2020OS,
|
||||
title = {OS Hardening - Making systems more secure},
|
||||
author = {John Ostrowski},
|
||||
year = {2020},
|
||||
urldate = {2023-12-09},
|
||||
}
|
||||
|
||||
online{SIDDARTH201910simple,
|
||||
title = {10 Simple Steps to Harden Your Docker Containers},
|
||||
author = {SIDDARTH SENTHILKUMAR},
|
||||
url = {https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/},
|
||||
year = {2019},
|
||||
urldate = {2023-10-04},
|
||||
}
|
||||
|
||||
online{vmblogParavirtualization,
|
||||
title = {What Are the Benefits of Paravirtualization?},
|
||||
author = {David Marshall},
|
||||
year = {2019},
|
||||
url = {https://vmblog.com/archive/2019/07/23/what-are-the-benefits-of-paravirtualization.aspx},
|
||||
urldate = {2023-01-26},
|
||||
}
|
||||
|
||||
online{Yathi2017Hardening,
|
||||
title = {Hardening Docker containers, images, and host - security toolkit},
|
||||
author = {Yathi Naik},
|
||||
year = {2017},
|
||||
url = {https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit},
|
||||
urldate = {2023-08-04},
|
||||
}
|
||||
|
||||
online{StackRox2019Docker,
|
||||
title = {Docker Container Security 101: Risks and 33 Best Practices},
|
||||
author = {StackRox},
|
||||
year = {2019},
|
||||
url = {https://www.stackrox.io/blog/docker-security-101/},
|
||||
urldate = {2023-10-15},
|
||||
}
|
||||
|
||||
online{Marcin2019Hardening,
|
||||
title = {Hardening Docker Quick Tips},
|
||||
author = {Marcin Teodorczyk},
|
||||
year = {2019},
|
||||
url = {https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964},
|
||||
urldate = {2023-08-19},
|
||||
}
|
||||
|
||||
online{redhatContainerRuntime,
|
||||
title = {How Kubernetes creates and runs containers: An illustrated guide},
|
||||
author = {Bob Reselman},
|
||||
year = {2022},
|
||||
url = {https://www.redhat.com/architect/how-kubernetes-creates-runs-containers},
|
||||
urldate = {2023-09-08},
|
||||
}
|
||||
|
||||
online{osVirtualizationInfo,
|
||||
title = {OS-Level Virtualization},
|
||||
author = {Vikas Jain, Vibha Goyal, Nitin Kundapur Bhat},
|
||||
year = {2016},
|
||||
url = {https://courses.engr.illinois.edu/cs423/sp2016/lectures/VirtOS.pdf},
|
||||
urldate = {2023-11-18},
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user