{"id":"https://openalex.org/W4379932692","doi":"https://doi.org/10.1145/3590837.3590879","title":"Security Enhancement using Image verification method to Secure Docker Containers","display_name":"Security Enhancement using Image verification method to Secure Docker Containers","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4379932692","doi":"https://doi.org/10.1145/3590837.3590879"},"language":"en","primary_location":{"id":"doi:10.1145/3590837.3590879","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101604227","display_name":"Vivek Saxena","orcid":"https://orcid.org/0009-0000-7023-5006"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vivek Saxena","raw_affiliation_strings":["CSE, PIET Jaipur, India"],"raw_orcid":"https://orcid.org/0009-0000-7023-5006","affiliations":[{"raw_affiliation_string":"CSE, PIET Jaipur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001488342","display_name":"Deepika Saxena","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deepika Saxena","raw_affiliation_strings":["CSE, PU Jaipur, India"],"raw_orcid":"https://orcid.org/0000-0003-0294-1245","affiliations":[{"raw_affiliation_string":"CSE, PU Jaipur, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060419096","display_name":"Uday Pratap Singh","orcid":"https://orcid.org/0000-0001-7573-8550"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Uday Pratap Singh","raw_affiliation_strings":["CSE, PIET Jaipur, India"],"raw_orcid":"https://orcid.org/0000-0001-7573-8550","affiliations":[{"raw_affiliation_string":"CSE, PIET Jaipur, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101604227"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.3806,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.96739521,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9140999913215637,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.845641553401947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7344167232513428},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.712427020072937},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7024810314178467},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5538849234580994},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4774739742279053},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4332343339920044},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4175057113170624},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.4169028401374817},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1404961347579956}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.845641553401947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7344167232513428},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.712427020072937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7024810314178467},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5538849234580994},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4774739742279053},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4332343339920044},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4175057113170624},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.4169028401374817},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1404961347579956},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590837.3590879","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2101849888","https://openalex.org/W2550874390","https://openalex.org/W2588479842"],"related_works":["https://openalex.org/W2964505913","https://openalex.org/W2390470226","https://openalex.org/W4311605530","https://openalex.org/W2507264430","https://openalex.org/W2139902894","https://openalex.org/W3046528639","https://openalex.org/W4362544759","https://openalex.org/W214962301","https://openalex.org/W2025666327","https://openalex.org/W2187795641"],"abstract_inverted_index":{"Now":[0],"with":[1,20],"the":[2,5,24,33,37,72,83,108,114,126,133,145],"dawn":[3],"of":[4,26,86,119,135],"internet,":[6,34],"cloud":[7,74,84,102],"computing":[8,75],"has":[9],"been":[10],"reformed":[11],"by":[12,32,131],"opening":[13],"new":[14,58],"horizons":[15],"at":[16],"an":[17],"inclusive":[18],"level":[19],"auspicious":[21],"opportunities.":[22],"With":[23],"rise":[25],"opportunities,":[27],"popularity,":[28],"and":[29,46,68,100,117,130,141],"public":[30],"connectivity":[31],"it":[35],"is":[36,85,105],"next":[38],"foremost":[39],"edge":[40,59],"for":[41],"Trojans,":[42],"worms,":[43],"viruses,":[44],"hackers":[45],"cyber-attacks":[47],"will":[48],"broaden":[49],"because":[50],"a":[51,57],"hacker":[52],"would":[53],"see":[54],"this":[55,122],"as":[56],"to":[60,62,71,92,95,113],"try":[61],"steal":[63],"confidential":[64],"interrupt,":[65],"information,":[66],"services":[67],"route":[69],"damage":[70],"originality":[73],"Docker":[76,80,98,104,127,136,148],"system.":[77],"Security":[78],"in":[79,147],"container":[81],"over":[82],"great":[87],"anxiety":[88],"hence":[89],"care":[90],"needs":[91],"be":[93],"taken":[94],"provide":[96],"secure":[97,101],"containers":[99],"services.":[103],"usual":[106],"within":[107],"software":[109],"development":[110],"community":[111],"due":[112],"portability,":[115],"versatility,":[116],"scalability":[118],"containers.":[120,149],"In":[121],"paper,":[123],"we":[124],"analyze":[125],"storage-based":[128],"security":[129,146],"applying":[132],"methods":[134],"image":[137],"verification,":[138],"checking":[139],"capabilities,":[140],"storage":[142],"selection,":[143],"improve":[144]},"counts_by_year":[{"year":2023,"cited_by_count":20}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
