Essays about: "container security"
Showing result 1 - 5 of 28 essays containing the words container security.
-
1. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles
University essay from KTH/Hälsoinformatik och logistikAbstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE
-
2. Kubernetes Automatic Geographical Failover Techniques
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. READ MORE
-
3. A Gateway to Intermodal Communication Flows : A case study on implications following digitalized communication flows within ports
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Following an increased transport activity, higher rates of intermodal transportation is seen as a possible way to a more sustainable transportation industry. Efficient and digitalized communication flows between actors can lead to improved flexibility and reliability, thus contributing to a more competitive service and higher utilization of intermodal transportation. READ MORE
-
4. Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review
University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskapAbstract : Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). READ MORE
-
5. Security in Rootless Containers : Measuring the Attack Surface of Containers
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Rootless containers are commonly perceived as more secure, as they run without added privileges. To the best of my knowledge, this hypothesis has never been proven. This thesis aims to contribute to addressing knowledge gaps in research by measuring the attack surface of Rootless Podman, Rootless Docker, as well as Rootful Docker for comparison. READ MORE