Subject Areas : Strategic Management
Mahsa Beigrezaei 1 , Seyed Ali Samouti 2
1 -
2 -
Keywords:
Abstract :
1. Burns, B., Grant, B., Oppenheimer, D., Brewer, E., & Wilkes, J. (2016). "Borg, Omega, and Kubernetes." ACM Queue, 14(1), 70-93. - This article from the creators of Kubernetes provides insights into the origins and design principles of Kubernetes, originating from Google’s internal systems.
2. Hightower, K., Burns, B., & Beda, J. (2017). Kubernetes: Up and Running: Dive into the Future of Infrastructure. O'Reilly Media, Inc. - A comprehensive guide to understanding Kubernetes, its features, and its operational benefits, suitable for both beginners and seasoned users.
3. Luksa, M. (2017). Kubernetes in Action. Manning Publications. - This book provides detailed explanations of Kubernetes' concepts and functionalities, including its architecture and ecosystem tools.
4. CNCF: Cloud Native Computing Foundation. (2021). "Annual Report." CNCF. - Annual reports from the CNCF offer statistical data on Kubernetes’ adoption and the growth of its ecosystem.
5. Sarna, G. (2020). "Addressing the challenges of Kubernetes security." Journal of Network Security, 2020(3), 45-50. - This journal article discusses the security challenges associated with Kubernetes and provides strategies to mitigate common vulnerabilities.
6. Weber, S. (2019). "Kubernetes: Complexities, challenges, and opportunities." TechCrunch. - An article discussing the complexities and learning curve associated with Kubernetes, along with the opportunities it presents for modern IT infrastructure.
7. Burns, B., Beda, J., & Hightower, K.** (2019). *Kubernetes: Up and Running: Dive into the Future of Infrastructure*. O'Reilly Media, Inc.
8. Hightower, K., Burns, B., & Beda, J.** (2017). *Kubernetes: Scheduling the Future at Cloud Scale*. O'Reilly Media, Inc.
9. Strebel, J.**, & **Sayfan, G.** (2018). *Mastering Kubernetes: Large scale container deployment and management*. Packt Publishing Ltd.
10. Luksa, M.** (2020). *Kubernetes in Action, Second Edition*. Manning Publications
11. Shamim, M.S.I., Bhuiyan, F.A. and Rahman, A., 2020. Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices. 2020 IEEE Secure Development (SecDev), pp.58-64.
12. Thu, K.M., 2024. Securing Kubernetes Services Exposed to Public Networks from Cyber Attacks.
13. Autio, T., 2021. Securing a Kubernetes Cluster on Google Cloud Platform.
14. Yang, Y., Shen, W., Ruan, B., Liu, W. and Ren, K., 2021, December. Security challenges in the container cloud. In 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (pp. 137-145). IEEE.
15. Turin, G., Borgarelli, A., Donetti, S., Johnsen, E.B., Tapia Tarifa, S.L. and Damiani, F., 2020, October. A formal model of the kubernetes container framework. In International Symposium on Leveraging Applications of Formal Methods (pp. 558-577). Cham: Springer International Publishing.
16. Medel, V., Tolosana-Calasanz, R., Bañares, J.Á., Arronategui, U. and Rana, O.F., 2018. Characterising resource management performance in Kubernetes. Computers & Electrical Engineering, 68, pp.286-297.
17. Poulton, N., 2023. The kubernetes book. NIGEL POULTON LTD.
18. Kayal, P., 2020, June. Kubernetes in fog computing: Feasibility demonstration, limitations and improvement scope. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) (pp. 1-6). IEEE.
19. Larsson, L., Gustafsson, H., Klein, C. and Elmroth, E., 2020, December. Decentralized kubernetes federation control plane. In 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC) (pp. 354-359). IEEE.
20. Budigiri, G., Baumann, C., Mühlberg, J.T., Truyen, E. and Joosen, W., 2021, June. Network policies in kubernetes: Performance evaluation and security analysis. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit) (pp. 407-412). IEEE.
21. Дарвеш, Г., Хаммуд, Д. and ВОРОБЬЕВА, А.А., 2022. Security in kubernetes: best practices and security analysis. Вестник УрФО. Безопасность в информационной сфере, (2 (44)), pp.63-69.
22. Kamieniarz, K. and Mazurczyk, W., 2024, May. A Comparative Study on the Security of Kubernetes Deployments. In 2024 International Wireless Communications and Mobile Computing (IWCMC) (pp. 0718-0723). IEEE.
23. Kamieniarz K, Mazurczyk W. A Comparative Study on the Security of Kubernetes Deployments. In2024 International Wireless Communications and Mobile Computing (IWCMC) 2024 May 27 (pp. 0718-0723). IEEE.• Patel, P. (2020). "Enhancing Kubernetes Security: A Comprehensive Guide." Journal of Cybersecurity and Digital Forensics, 12(4), 201-210.
24. Sharma, S., & Smith, J. (2021). "Advanced Encryption Techniques for Cloud Environments: Application to Kubernetes." Cloud Security Journal, 14(2), 134-145.
25. Liu, H., & Zhang, Y. (2019). "Role-Based Access Control in Kubernetes: Analysis and Enhancements." IEEE Transactions on Cloud Computing, 7(3), 750-763.
26. Green, M. (2022). "Utilizing Network Policies in Kubernetes: Best Practices and Case Studies." Network Security Review, 24(1), 45-59.
27. Thompson, R. (2020). "Vulnerability Management for Containerized Environments: Tools and Practices." Journal of Network and Computer Applications, 48(3), 112-127.