{"id":"https://openalex.org/W7125123851","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331450","title":"Securing Cloud-Native Applications via Infrastructure as Code and DevOps","display_name":"Securing Cloud-Native Applications via Infrastructure as Code and DevOps","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7125123851","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331450"},"language":null,"primary_location":{"id":"doi:10.1109/cloudcom67567.2025.11331450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331450","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123453474","display_name":"Abdelali Khatibi","orcid":null},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Abdelali Khatibi","raw_affiliation_strings":["Technical University of Denmark,SPTAGE Lab,Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,SPTAGE Lab,Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123382330","display_name":"Weizhi Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Technical University of Denmark,SPTAGE Lab,Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,SPTAGE Lab,Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071023660","display_name":"Wenjuan Li","orcid":"https://orcid.org/0000-0003-1898-6448"},"institutions":[{"id":"https://openalex.org/I4210086892","display_name":"Education University of Hong Kong","ror":"https://ror.org/000t0f062","country_code":"HK","type":"education","lineage":["https://openalex.org/I4210086892"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenjuan Li","raw_affiliation_strings":["The Education University of Hong Kong,Department of Mathematics and Information Technology,Hong Kong SAR"],"affiliations":[{"raw_affiliation_string":"The Education University of Hong Kong,Department of Mathematics and Information Technology,Hong Kong SAR","institution_ids":["https://openalex.org/I4210086892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Stevens Institute of Technology,Department of Electrical and Computer Engineering,USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,Department of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5123453474"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8381395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.3562000095844269,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.3562000095844269,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.21639999747276306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.09749999642372131,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7860999703407288},{"id":"https://openalex.org/keywords/devops","display_name":"DevOps","score":0.6366000175476074},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.536899983882904},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5019000172615051},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.44769999384880066},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4007999897003174},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39660000801086426},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.3228999972343445}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7860999703407288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6642000079154968},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.6366000175476074},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.536899983882904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5314000248908997},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5019000172615051},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44769999384880066},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4007999897003174},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39660000801086426},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.3228999972343445},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3093000054359436},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.30070000886917114},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.29339998960494995},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.2881999909877777},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2865999937057495},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.28130000829696655},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2612000107765198},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C85687889","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy code","level":3,"score":0.258899986743927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom67567.2025.11331450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331450","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.670798659324646,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2141992894","https://openalex.org/W3196457720","https://openalex.org/W4210705543","https://openalex.org/W4226116352","https://openalex.org/W4292253735","https://openalex.org/W4312768612","https://openalex.org/W4321608114","https://openalex.org/W4362667281","https://openalex.org/W4385568284","https://openalex.org/W4385962743","https://openalex.org/W4389077354","https://openalex.org/W4390576799","https://openalex.org/W4390805739","https://openalex.org/W4391304488","https://openalex.org/W4391305513","https://openalex.org/W4392666342","https://openalex.org/W4396690307","https://openalex.org/W4400036639","https://openalex.org/W4407985906","https://openalex.org/W4408100572","https://openalex.org/W4411171773","https://openalex.org/W4411788079"],"related_works":[],"abstract_inverted_index":{"A":[0],"cloud-native":[1,127,130],"application":[2,20,92],"is":[3,27,47,75],"kind":[4],"of":[5,110],"software":[6],"built":[7,89],"to":[8,28,57,71,87,123],"fully":[9],"leverage":[10],"a":[11,18,48,76,108,125,148],"cloud":[12,44,150],"computing":[13],"environment,":[14],"rather":[15,99],"than":[16,100],"being":[17],"traditional":[19],"adapted":[21],"for":[22,78],"the":[23,61,63,65,68,83,91,96],"cloud.":[24,69],"The":[25],"goal":[26],"create":[29],"agile,":[30],"resilient,":[31],"and":[32,39,67,93,138,140],"scalable":[33],"applications":[34],"that":[35,55],"can":[36],"be":[37,58,88],"deployed":[38],"managed":[40],"efficiently":[41],"in":[42,118],"any":[43],"environment.":[45],"It":[46],"layered":[49],"approach":[50],"with":[51],"four":[52],"layers":[53],"(4C)":[54],"need":[56],"secured,":[59],"including":[60],"code,":[62],"container,":[64],"cluster,":[66],"Due":[70],"its":[72,142],"importance,":[73],"security":[74,112],"priority":[77],"such":[79,132],"applications.":[80],"To":[81],"enhance":[82],"security,":[84],"it":[85,146],"needs":[86],"into":[90],"infrastructure":[94,128,134],"from":[95],"ground":[97],"up,":[98],"added":[101],"on":[102,147],"as":[103,133,135],"an":[104],"afterthought.":[105],"This":[106],"requires":[107],"combination":[109],"automated":[111],"controls.":[113],"Motivated":[114],"by":[115,144],"this":[116,119],"requirement,":[117],"work,":[120],"we":[121],"aim":[122],"build":[124],"secure":[126],"via":[129],"technologies":[131],"code":[136],"(IaC)":[137],"DevOps,":[139],"demonstrate":[141],"performance":[143],"deploying":[145],"public":[149],"provider":[151],"AWS":[152],"(Amazon":[153],"Web":[154],"Services).":[155]},"counts_by_year":[],"updated_date":"2026-01-22T23:33:04.759266","created_date":"2026-01-22T00:00:00"}
