{"id":"https://openalex.org/W4387711980","doi":"https://doi.org/10.1109/acit58437.2023.10275654","title":"Software for Improve the Security of Kubernetes-based CI/CD Pipeline","display_name":"Software for Improve the Security of Kubernetes-based CI/CD Pipeline","publication_year":2023,"publication_date":"2023-09-21","ids":{"openalex":"https://openalex.org/W4387711980","doi":"https://doi.org/10.1109/acit58437.2023.10275654"},"language":"en","primary_location":{"id":"doi:10.1109/acit58437.2023.10275654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58437.2023.10275654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 13th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045605427","display_name":"Ruslan Shevchuk","orcid":"https://orcid.org/0000-0001-5381-9528"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]},{"id":"https://openalex.org/I62088572","display_name":"University of Bielsko-Bia\u0142a","ror":"https://ror.org/01ew38b77","country_code":"PL","type":"education","lineage":["https://openalex.org/I62088572"]}],"countries":["PL","UA"],"is_corresponding":true,"raw_author_name":"Ruslan Shevchuk","raw_affiliation_strings":["West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine","Department of Computer Science, Automatics University of Bielsko-Biala, Bielsko-Biala, Poland"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Computer Science, Automatics University of Bielsko-Biala, Bielsko-Biala, Poland","institution_ids":["https://openalex.org/I62088572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040752096","display_name":"Miko\u0142aj Karpi\u0144ski","orcid":"https://orcid.org/0000-0002-8846-332X"},"institutions":[{"id":"https://openalex.org/I4210147056","display_name":"Ternopil Ivan Pului National Technical University","ror":"https://ror.org/045hmbf04","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210147056"]},{"id":"https://openalex.org/I4210138923","display_name":"Pa\u0144stwowa Wy\u017csza Szko\u0142a Zawodowa w Nowym S\u0105czu","ror":"https://ror.org/04e2ggq49","country_code":"PL","type":"education","lineage":["https://openalex.org/I4210138923"]}],"countries":["PL","UA"],"is_corresponding":false,"raw_author_name":"Mikolaj Karpinski","raw_affiliation_strings":["University of Applied Sciences in Nowy Sacz,Department of Computer Science,Nowy Sacz,Poland","Department of Computer Science, University of Applied Sciences in Nowy Sacz, Nowy Sacz, Poland","Department of Cyber Security, I. Puluj National Technical University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences in Nowy Sacz,Department of Computer Science,Nowy Sacz,Poland","institution_ids":["https://openalex.org/I4210138923"]},{"raw_affiliation_string":"Department of Computer Science, University of Applied Sciences in Nowy Sacz, Nowy Sacz, Poland","institution_ids":["https://openalex.org/I4210138923"]},{"raw_affiliation_string":"Department of Cyber Security, I. Puluj National Technical University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I4210147056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016123191","display_name":"Mykhailo Kasianchuk","orcid":"https://orcid.org/0000-0002-4469-8055"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Kasianchuk","raw_affiliation_strings":["West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine","Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110731390","display_name":"Ihor Yakymenko","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ihor Yakymenko","raw_affiliation_strings":["West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine","Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101743756","display_name":"Andriy Melnyk","orcid":"https://orcid.org/0000-0001-7799-9877"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Andriy Melnyk","raw_affiliation_strings":["West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093078366","display_name":"Roman Tykhyi","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Roman Tykhyi","raw_affiliation_strings":["West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]},{"raw_affiliation_string":"Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045605427"],"corresponding_institution_ids":["https://openalex.org/I160977438","https://openalex.org/I62088572"],"apc_list":null,"apc_paid":null,"fwci":11.2278,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.98023324,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"420","last_page":"425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7244476675987244},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.5914937257766724},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5215656161308289},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5202701687812805},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.499859094619751},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.48648402094841003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4815843105316162},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4569171071052551},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4449053108692169},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4341576397418976},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3362891376018524},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26681894063949585},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.16877183318138123},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.15559512376785278}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7244476675987244},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.5914937257766724},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5215656161308289},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5202701687812805},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.499859094619751},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.48648402094841003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4815843105316162},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4569171071052551},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4449053108692169},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4341576397418976},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3362891376018524},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26681894063949585},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16877183318138123},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15559512376785278}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit58437.2023.10275654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58437.2023.10275654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 13th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1529857345","https://openalex.org/W2603119212","https://openalex.org/W2788346896","https://openalex.org/W2883411629","https://openalex.org/W2965317624","https://openalex.org/W3029036724","https://openalex.org/W3085429270","https://openalex.org/W3096410526","https://openalex.org/W3122234344","https://openalex.org/W3178712863","https://openalex.org/W3183394046","https://openalex.org/W3184498084","https://openalex.org/W4200480510","https://openalex.org/W4205617621","https://openalex.org/W4220778818","https://openalex.org/W4220829356","https://openalex.org/W4226153106","https://openalex.org/W4226323617","https://openalex.org/W4226439126","https://openalex.org/W4244806011","https://openalex.org/W4283786364","https://openalex.org/W4293689810","https://openalex.org/W4295953999","https://openalex.org/W4311617450","https://openalex.org/W4311688573","https://openalex.org/W4321064599","https://openalex.org/W4323365762","https://openalex.org/W4363678119","https://openalex.org/W4372405320","https://openalex.org/W4378874293","https://openalex.org/W6783610666","https://openalex.org/W6797753941"],"related_works":["https://openalex.org/W2100022726","https://openalex.org/W1978034799","https://openalex.org/W2003584227","https://openalex.org/W2167539342","https://openalex.org/W2126366602","https://openalex.org/W2352736757","https://openalex.org/W4384518368","https://openalex.org/W3135867972","https://openalex.org/W4225160120","https://openalex.org/W945978269"],"abstract_inverted_index":{"CI/CD":[0,109,133],"systems":[1],"allow":[2],"automation":[3],"of":[4,7,18,44,52,67,80,90,107,130],"the":[5,16,39,49,62,68,74,81,85,91,96,105,128,131,173],"processes":[6,141],"software":[8,19,124,138],"development,":[9],"testing,":[10],"and":[11,42,65,88,94,118,165],"delivery,":[12],"which":[13],"greatly":[14],"simplifies":[15],"work":[17],"developers.":[20],"Kubernetes,":[21,53],"an":[22,77],"open-source":[23],"container":[24],"orchestration":[25],"platform,":[26],"has":[27],"become":[28],"increasingly":[29],"popular":[30],"among":[31],"developers":[32],"due":[33],"to":[34,37,103,171],"its":[35],"ability":[36],"automate":[38],"deployment,":[40],"scaling,":[41],"management":[43],"containerized":[45],"applications.":[46],"However,":[47],"with":[48,156],"growing":[50],"use":[51],"security":[54,106,129],"concerns":[55],"have":[56],"emerged,":[57],"highlighting":[58],"numerous":[59,82],"vulnerabilities":[60,83],"in":[61,84],"design,":[63,86],"implementation,":[64,87],"operation":[66,89],"Kubernetes":[69,92,108],"environment.":[70],"In":[71,135],"this":[72],"paper,":[73],"authors":[75],"provided":[76],"in-depth":[78],"analysis":[79],"environment":[93],"summarize":[95],"best":[97],"practices":[98],"that":[99,126,142],"can":[100],"be":[101],"used":[102,115,170],"enhance":[104],"processes.":[110],"The":[111],"obtained":[112],"results":[113],"were":[114],"for":[116,151,162],"designing":[117],"implementing":[119],"a":[120],"CI":[121],"/":[122],"CD":[123],"system":[125,139],"improves":[127],"Kubernetes-based":[132],"pipeline.":[134],"addition,":[136],"created":[137],"monitors":[140],"are":[143],"happening":[144],"during":[145],"pipeline":[146],"execution.":[147],"JavaScript,":[148],"NestJS":[149],"framework":[150,155],"server":[152,168],"side,":[153,164],"React":[154],"Single":[157],"Page":[158],"Application":[159],"(SPA)":[160],"approach":[161],"client":[163],"Nginx":[166],"web":[167],"was":[169],"implement":[172],"software.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
