A secure edge power system based on a Docker container
Thanks to the advantages of low latency, high efficiency, and oneself-security, the edge computing (EC) paradigm is expected to widely be applied in a large number of scenarios. However, because EC equipment is closer to a wide variety of terminals in a realistic environment, it is also more vulnera...
Main Authors: | Xinchen Xu, Yixin Jiang, Hong Wen, Wenjing Hou, Songlin Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2022-09-01
|
Series: | Frontiers in Energy Research |
Subjects: | |
Online Access: | https://www.frontiersin.org/articles/10.3389/fenrg.2022.975753/full |
Similar Items
-
Experimental Analysis of Security Attacks for Docker Container Communications
by: Haneul Lee, et al.
Published: (2023-02-01) -
DIVDS: Docker Image Vulnerability Diagnostic System
by: Soonhong Kwon, et al.
Published: (2020-01-01) -
A Security Isolation System Based on Docker Container Behavior Analysis
by: WANG Jie, et al.
Published: (2022-05-01) -
Design and Implementation of Cloud Docker Application Architecture Based on Machine Learning in Container Management for Smart Manufacturing
by: Byoung Soo Kim, et al.
Published: (2022-07-01) -
A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing
by: Aparna Tomar, et al.
Published: (2022-02-01)