{"title":"无服务器服务架构和最低安全要求","authors":"N. Coelho, Manuela Cruz-Cunha","doi":"10.1109/ISDFS55398.2022.9800779","DOIUrl":null,"url":null,"abstract":"The Serverless subject is an emerging new world within technology scope. Although it seems to be by name a specific and a circumscriptive topic, it is a vast and complex subject that has an ongoing study and not a standardized use to be promoted as a technology standard. There are a variety of complex offers, platforms, products, applications, and ways to use, but, like other emerging and essential technologies, it has not yet been broadly accepted as architecture, and for cybersecurity, it’s complex to configure. This doesn't mean it is not usable or defective; it is only an anticipated conclusion and analysis of the factual and present panorama. This research has the objective of demonstrating the pontification of the use of Serverless architectures and the base security measures and risks to consider. This research reviewed prominent research articles from IEEE Journals and interviews with developers that are in contact with this technology, clarifying the central aspect of Serverless, its overall architecture as secure technology-usable-results cross platforms. This research aimed at the principal types of usage, security aspects within the mobile, its applications and networks parts and within the Cloud, the applications, filesystems, and possible other main uses. The study scope of these systems is circumscribed to the technology, tendencies, best and worst of its model, and lastly, its usage.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Serverless Service Architectures and Security Minimals\",\"authors\":\"N. Coelho, Manuela Cruz-Cunha\",\"doi\":\"10.1109/ISDFS55398.2022.9800779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Serverless subject is an emerging new world within technology scope. Although it seems to be by name a specific and a circumscriptive topic, it is a vast and complex subject that has an ongoing study and not a standardized use to be promoted as a technology standard. There are a variety of complex offers, platforms, products, applications, and ways to use, but, like other emerging and essential technologies, it has not yet been broadly accepted as architecture, and for cybersecurity, it’s complex to configure. This doesn't mean it is not usable or defective; it is only an anticipated conclusion and analysis of the factual and present panorama. This research has the objective of demonstrating the pontification of the use of Serverless architectures and the base security measures and risks to consider. This research reviewed prominent research articles from IEEE Journals and interviews with developers that are in contact with this technology, clarifying the central aspect of Serverless, its overall architecture as secure technology-usable-results cross platforms. This research aimed at the principal types of usage, security aspects within the mobile, its applications and networks parts and within the Cloud, the applications, filesystems, and possible other main uses. The study scope of these systems is circumscribed to the technology, tendencies, best and worst of its model, and lastly, its usage.\",\"PeriodicalId\":114335,\"journal\":{\"name\":\"2022 10th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 10th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS55398.2022.9800779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Serverless Service Architectures and Security Minimals
The Serverless subject is an emerging new world within technology scope. Although it seems to be by name a specific and a circumscriptive topic, it is a vast and complex subject that has an ongoing study and not a standardized use to be promoted as a technology standard. There are a variety of complex offers, platforms, products, applications, and ways to use, but, like other emerging and essential technologies, it has not yet been broadly accepted as architecture, and for cybersecurity, it’s complex to configure. This doesn't mean it is not usable or defective; it is only an anticipated conclusion and analysis of the factual and present panorama. This research has the objective of demonstrating the pontification of the use of Serverless architectures and the base security measures and risks to consider. This research reviewed prominent research articles from IEEE Journals and interviews with developers that are in contact with this technology, clarifying the central aspect of Serverless, its overall architecture as secure technology-usable-results cross platforms. This research aimed at the principal types of usage, security aspects within the mobile, its applications and networks parts and within the Cloud, the applications, filesystems, and possible other main uses. The study scope of these systems is circumscribed to the technology, tendencies, best and worst of its model, and lastly, its usage.