Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

Security in microservice-based systems: A multivocal literature review

A Pereira-Vale, EB Fernandez, R Monge… - Computers & …, 2021 - Elsevier
Microservices define an architectural style that conceives systems as a suite of modular,
independent and scalable services. While application design is now simpler, designing …

Contextual understanding of microservice architecture: current and future directions

T Cerny, MJ Donahoo, M Trnka - ACM SIGAPP Applied Computing …, 2018 - dl.acm.org
Current industry trends in enterprise architectures indicate movement from Service-Oriented
Architecture (SOA) to Microservices. By understanding the key differences between these …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

Emerging wireless sensor networks and Internet of Things technologies—Foundations of smart healthcare

G Gardašević, K Katzis, D Bajić, L Berbakov - Sensors, 2020 - mdpi.com
Future smart healthcare systems—often referred to as Internet of Medical Things (IoMT)–will
combine a plethora of wireless devices and applications that use wireless communication …

Big Data Security through Privacy–Preserving Data Mining (PPDM): A Decentralization Approach

R Josphineleela, S Kaliappan… - … on Electronics and …, 2023 - ieeexplore.ieee.org
The increasing familiarity and improvements in data mining technologies bring serious
security threats to the data of individuals. An emerging technology that provides better …

Evaluating security and privacy issues of social networks based information systems in Industry 4.0

JR Saura, D Ribeiro-Soriano… - Enterprise Information …, 2022 - Taylor & Francis
The present study aimed to analyse the main risks related to security and privacy of social
networks based information systems in Industry 4.0. The methodology we used is an …

[PDF][PDF] An architecture of IoT-aware healthcare smart system by leveraging machine learning.

H Aldabbas, D Albashish, K Khatatneh… - Int. Arab J. Inf …, 2022 - researchgate.net
In a healthcare environment, Internet of Things (IoT) sensors' devices are integrated to help
patients and Physicians remotely. Physicians interconnect with their patients to monitor their …

Security mechanisms used in microservices-based systems: A systematic mapping

A Pereira-Vale, G Márquez, H Astudillo… - 2019 XLV Latin …, 2019 - ieeexplore.ieee.org
Microservices is an architectural style that conceives systems as a modular, costumer,
independent and scalable suite of services; it offers several advantages but its growing …

Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …