Zaheer, 2019
| Publication | Publication Date | Title |
|---|---|---|
| Zaheer et al. | eztrust: Network-independent zero-trust perimeterization for microservices | |
| US20220103593A1 (en) | Systems and methods for securing a workload | |
| US11949656B2 (en) | Network traffic inspection | |
| Yu et al. | A survey on security issues in services communication of Microservices‐enabled fog applications | |
| US11457040B1 (en) | Reverse TCP/IP stack | |
| US7725934B2 (en) | Network and application attack protection based on application layer message inspection | |
| Goltzsche et al. | Endbox: Scalable middlebox functions using client-side trusted execution | |
| US10020941B2 (en) | Virtual encryption patching using multiple transport layer security implementations | |
| US20060123226A1 (en) | Performing security functions on a message payload in a network element | |
| WO2020015838A1 (en) | Zero trust perimeterization for microservices | |
| Beer et al. | Adaptive security architecture for protecting RESTful web services in enterprise computing environment | |
| US20250193249A1 (en) | Inventory monitoring for cloud resource protection in real time | |
| Chandramouli et al. | Attribute-based access control for microservices-based applications using a service mesh | |
| Bradatsch et al. | ZTSFC: a service function chaining-enabled zero trust architecture | |
| US20220329433A1 (en) | Methods, systems, articles of manufacture and apparatus to protect distributed data | |
| Tseng et al. | A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking | |
| Walsh et al. | Intra-cloud and inter-cloud authentication | |
| Sánchez et al. | Security issues and threats that may affect the hybrid cloud of FINESCE | |
| Budigiri et al. | Zero-cost in-depth enforcement of network policies for low-latency cloud-native systems | |
| Benzidane et al. | Application-based authentication on an inter-VM traffic in a cloud environment | |
| Zaheer | Eztrust: Network Independent Perimeterization for Microservices | |
| Pattaranantakul | Moving towards software-defined security in the era of NFV and SDN | |
| Sanghavi et al. | Software-defined networks a brief overview and survey of services | |
| Chifor et al. | IoT Cloud Security Design Patterns | |
| Nikbakht Bideh et al. | Chuchotage: In-line Software Network Protocol Translation for (D) TLS |