Cited By
View all- Abdelfattah ACerny T(2023)Microservices Security Challenges and ApproachesProceedings of the 30th International Conference on Information Systems Development10.62036/ISD.2022.27Online publication date: 2023
- Rahaman MTisha SSong ECerny T(2023)Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping StudySensors10.3390/s2307341323:7(3413)Online publication date: 24-Mar-2023
- Yang NShen WLi JLiu XGuo XMa JMeng WJensen CCremers CKirda E(2023)Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party ApplicationsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623121(3048-3062)Online publication date: 15-Nov-2023
- Show More Cited By