Files
Thesis/Bibliography.bib

163 lines
5.6 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@inproceedings{balduzzi2012security,
author = {Balduzzi, Marco and Zaddach, Jonas and Balzarotti, Davide and Kirda, Engin and Loureiro, Sergio},
title = {A Security Analysis of Amazon's Elastic Compute Cloud Service},
year = {2012},
isbn = {9781450308571},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2245276.2232005},
doi = {10.1145/2245276.2232005},
booktitle = {Proceedings of the 27th Annual ACM Symposium on Applied Computing},
pages = {14271434},
numpages = {8},
keywords = {security, elastic compute cloud service, cloud computing},
location = {Trento, Italy},
series = {SAC '12}
}
@inproceedings{manu2016study,
author={Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
booktitle={2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
title={A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
year={2016},
volume={},
number={},
pages={1-13},
doi={10.1109/ICCPCT.2016.7530284}
}
@misc{bui2015analysis,
doi = {10.48550/ARXIV.1501.02967},
url = {https://arxiv.org/abs/1501.02967},
author = {Bui, Thanh},
keywords = {Cryptography and Security (cs.CR), FOS: Computer and information sciences, FOS: Computer and information sciences},
title = {Analysis of Docker Security},
publisher = {arXiv},
year = {2015},
copyright = {arXiv.org perpetual, non-exclusive license}
}
@inproceedings{wenhao2020vulnerability,
author={Wenhao, Jiang and Zheng, Li},
booktitle={2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
title={Vulnerability Analysis and Security Research of Docker Container},
year={2020},
volume={},
number={},
pages={354-357},
doi={10.1109/ICISCAE51034.2020.9236837}
}
@article{combe2016docker,
author={Combe, Theo and Martin, Antony and Di Pietro, Roberto},
journal={IEEE Cloud Computing},
title={To Docker or Not to Docker: A Security Perspective},
year={2016},
volume={3},
number={5},
pages={54-62},
keywords={},
doi={10.1109/MCC.2016.100},
ISSN={2325-6095},
month={Sep.}
}
@inproceedings{loukidis2018docker,
author={Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
booktitle={2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
title={Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
year={2018},
volume={},
number={},
pages={1561-1564},
doi={10.1109/ICDCS.2018.00169}
}
@inproceedings{mp2016enhancing,
author={Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
booktitle={2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
title={Enhancing security of Docker using Linux hardening techniques},
year={2016},
volume={},
number={},
pages={94-99},
doi={10.1109/ICATCCT.2016.7911971}
}
@article{jogi2017establishing,
title={Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
author={Jogi, Martin},
journal={University of Tartu, Tartu},
year={2017}
}
@article{kaur2014hardening,
title={Hardening OS Identity by Customised Masking Techniques},
author={Kaur, Ratinder and Singh, Maninder},
journal={Thapar University, Punjab, India},
year={2014}
}
@article{zhu2021lic,
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
journal = {Journal of Information Security and Applications},
volume = {61},
pages = {102924},
year = {2021},
issn = {2214-2126},
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
author = {Hui Zhu and Christian Gehrmann},
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker}
}
@misc{John2020OS,
title={OS Hardening - Making systems more secure},
author={John Ostrowski},
year={2020}
}
@misc{SIDDARTH201910simple,
title={10 Simple Steps to Harden Your Docker Containers},
author={SIDDARTH SENTHILKUMAR},
howpublished="\url{https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/}",
year={2019}
}
@misc{Yathi2017Hardening,
title={Hardening Docker containers, images, and host - security toolkit},
author={Yathi Naik},
howpublished="\url{https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit}",
year={2017}
}
@misc{StackRox2019Docker,
title={Docker Container Security 101: Risks and 33 Best Practices},
author={StackRox},
howpublished="\url{https://www.stackrox.io/blog/docker-security-101/}",
year={2019}
}
@misc{Marcin2019Hardening,
title={Hardening Docker Quick Tips},
author={Marcin Teodorczyk},
howpublished="\url{https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964}",
year={2019}
}
@misc{deviceWhitelistController,
title={Device Whitelist Controller},
author={The Linux kernel users and administrators guide},
howpublished="\url{https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html}"
}
@inproceedings{reshetova2014security,
title={Security of OS-level virtualization technologies},
author={Reshetova, Elena and Karhunen, Janne and Nyman, Thomas and Asokan, N},
booktitle={Nordic Conference on Secure IT Systems},
pages={77--93},
year={2014},
organization={Springer}
}