Acknowledgement
이 성과는 2016년도 정부(교육부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임 (No.2016R1D1A1B04932067).
References
- Huang, L. S., Adhikarla, S., Boneh, D., Jackson, C, "An Experimental Study of TLS Forward Secrecy Deployments," IEEE Internet Computing, pp. 43-51, 2014.
- Morrissey, P., Smart, N. P., Warinschi, B., "A Modular Security Analysis of the TLS Handshake Protocol," International Conference on the Theory and Application of Cryptology and Information Security, pp. 55-73, 2008.
- Dierks, T., Rescorla, E., "The Transport Layer Security (TLS) protocol version 1.2," 2008.
- https://kubernetes.io/
- Habbal, N., "Enhancing Availability of Microservice Architecture: A Case Study on Kubernetes Security Configurations," 2020.
- He, X., Yang, X., "Authentication and Authorization of end user in Microservice Architecture," Physics: Conference Series, Vol. 910, 2017.
- Shamim, M. S. I., Bhuiyan, F. A., Rahman, A., "XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices," 2020 IEEE Secure Development (SecDev), pp. 58-64, 2020.
- R. Eidenbenz, Y. Pignolet, A. Ryser, "Latency-Aware Industrial Fog Application Orchestration with Kubernetes," 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 164-171, 2020.
- Nash, A., Duane, W., Joseph, C., "PKI: Implementing and Managing E-security," 2001.
- P. Szalachowski, L. Chuat, A. Perrig, "PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem," 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 407-422, 2016.
- T.H. Kim, T.Y. Kim, Y.E. Choi, M.H. Choi, Sunngeun Jin, "Virtualization and Kubernetes,". OSIA Standards & Technology Review, pp. 4-10, 2020 (in Korean).
- Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J. A., VanderSloot, B., "Imperfect Forward Secrecy: How Diffie-Hellman fails in Practice," 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5-17, 2015.
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format
- Luby, M., Rackoff, C., "How to Construct Pseudorandom Permutations from Pseudorandom Functions," SIAM Journal on Computing, pp. 373-386, 1988.