Segui questo link per vedere altri tipi di pubblicazioni sul tema: CD Security.

Articoli di riviste sul tema "CD Security"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "CD Security".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Testo completo
Abstract (sommario):
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Researcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.

Testo completo
Abstract (sommario):
This comprehensive article explores the critical challenge of securing Continuous Integration and Continuous Deployment (CI/CD) pipelines in modern software development. It addresses the common security threats faced by organizations, including credential leaks, supply chain attacks, and unauthorized access, while offering actionable strategies to mitigate these risks. The paper delves into best practices for enhancing CI/CD security, covering crucial aspects such as secret management, encryption techniques, secure CI/CD tools, immutable infrastructure, and comprehensive security testing metho
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Testo completo
Abstract (sommario):
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps—combining security with the DevOps process—has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Ho-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.

Testo completo
Abstract (sommario):
Continuous Integration (CI) and Continuous Deployment (CD) are important aspects in software engineering today. In modern software production organizational models, CI/CD pipeline has become a mandatory element to improve speed and reduce team effort in developing, integrating, and deploying. In the context of increasing information security risks, deploying security tools for the CI/CD pipeline has become an inevitable trend. Deploying information security tools throughout the pipeline according to the "Shift Left" philosophy will help detect information security issues early for timely handl
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.

Testo completo
Abstract (sommario):
Zero Trust architecture represents a fundamental shift in securing cloud infrastructure, particularly within CI/CD pipelines where traditional perimeter-based security approaches increasingly fail against sophisticated threats. This technical article explores how implementing Zero Trust principles—"never trust, always verify"—creates robust protection throughout the software delivery lifecycle. The implementation spans across multiple dimensions: securing modern CI/CD tools including GitHub Actions, Azure DevOps, and GitLab; establishing comprehensive identity and access management with just-i
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Ponaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.

Testo completo
Abstract (sommario):
Security vulnerabilities in software development can lead to severe risks if not addressed promptly. By adopting a shift-left approach and implementing gating mechanisms in Continuous Integration/Continuous Delivery (CI/CD) pipelines, organizations can mitigate the impact of high and critical vulnerabilities early in the Software Development Life Cycle (SDLC). This paper discusses a practical methodology for integrating security gates into the CI/CD pipeline to prevent the release of software with critical security flaws. Keywords —Vulnerability Management, Shift-Left Security, CI/CD Pipeline,
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Tipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Satya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ponaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.

Testo completo
Abstract (sommario):
This paper discusses a systematic approach to integrating Static Application Security Testing (SAST), Software Composition Analysis (SCA), Code Coverage, and Code Quality Checks into Continuous Integration/Continuous Delivery (CI/CD) pipelines. Modern CI/CD pipelines accelerate software delivery but introduce significant security and quality challenges. By incorporating SAST and SCA for security testing, along with code coverage and quality checks, organizations can prevent code vulnerabilities and ensure the maintainability and reliability of their applications. This approach helps developmen
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Devashish Ghanshyambhai Patel. "Enhancing CI/CD security with provenance metadata and supply chain best practices." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 019–32. https://doi.org/10.30574/wjaets.2025.16.1.1181.

Testo completo
Abstract (sommario):
Continuous Integration and Continuous Delivery (CI/CD) pipelines have transformed modern software development by enabling faster release cycles, increased collaboration, and improved automation. However, these benefits also introduce complex security challenges, particularly within software supply chains. As the sophistication of cyber threats evolves, adversaries are increasingly targeting CI/CD environments to infiltrate trusted software delivery processes. This journal article presents a comprehensive exploration of how integrating provenance metadata and adopting supply chain security best
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Samuel Jesupelumi Owoade, Abel Uzoka, Joshua Idowu Akerele, and Pascal Ugochukwu Ojukwu. "Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines." World Journal of Engineering and Technology Research 3, no. 2 (2024): 011–21. http://dx.doi.org/10.53346/wjetr.2024.3.2.0059.

Testo completo
Abstract (sommario):
In the fast-evolving landscape of financial services, data security and regulatory compliance are critical challenges that cloud-based solutions can address effectively. This paper explores the implementation of cloud-based compliance and data security solutions in financial applications, with a specific focus on using Continuous Integration and Continuous Deployment (CI/CD) pipelines. By integrating CI/CD pipelines, financial institutions can streamline deployment processes, ensuring rapid delivery while maintaining compliance with regulatory frameworks such as GDPR, PCI-DSS, and SOC 2. The C
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Rohith Aitharaju. "Policy-driven infrastructure hardening using CI/CD pipelines in enterprise environments." International Journal of Science and Research Archive 7, no. 1 (2022): 591–602. https://doi.org/10.30574/ijsra.2022.7.1.0280.

Testo completo
Abstract (sommario):
The way modern businesses are speeding up software implementation using CI/CD, securely managing infrastructure automatically has never been more essential. Old methods of protecting systems, made by hand and only done when problems arise, cannot catch up to what DevOps pipelines require. This research looks at using Policy-as-Code (PaC) in CI/CD pipelines to apply policy-driven hardening to infrastructure which helps maintain compliance, consistency and robustness. The research further examines basic ideas like Infrastructure as Code (IaC), managing configurations and the important security b
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Akilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.

Testo completo
Abstract (sommario):
In the era of DevOps, the integration of Continuous Integration and Continuous Deployment (CI/CD) pipelines has revolutionized the software development lifecycle, ensuring rapid and reliable delivery of applications. However, this accelerated development pace introduces significant security challenges, particularly in maintaining the security posture of local servers. This paper investigates the integration of vulnerability scanning into CI/CD pipelines, aiming to enhance the security of applications and underlying infrastructure throughout the development process. We explore various vulnerabi
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Yang, Shuai. "The Impact of Continuous Integration and Continuous Delivery on Software Development Efficiency." Journal of Computer, Signal, and System Research 2, no. 3 (2025): 59–68. https://doi.org/10.71222/pzvfqm21.

Testo completo
Abstract (sommario):
This paper explores the impact of Continuous Integration (CI) and Continuous Delivery (CD) on software development efficiency. By examining the core principles, practices, and benefits of CI/CD, the study highlights how these practices contribute to faster development cycles, improved code quality, and enhanced collaboration across development teams. The paper discusses the challenges organizations face when implementing CI/CD, such as tool selection, cultural resistance, and security concerns, and provides practical recommendations for overcoming these obstacles. Additionally, it offers insig
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Baladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.

Testo completo
Abstract (sommario):
Implementing RESTful microservices across various cloud platforms necessitates automation to guarantee consistency, security, and scalability. Continuous Integration/Continuous Deployment (CI/CD) pipelines optimize the integration, testing, and deployment of services, thereby minimizing manual intervention and operational risks. This study introduces a comprehensive framework for fully automated CI/CD processes, integrating Infrastructure as Code (IaC), security protocols, and monitoring software solutions. The proposal tackles crucial issues like multi-cloud compatibility, vendor lock-in, and
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Kamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.

Testo completo
Abstract (sommario):
As organizations increasingly adopt DevOps practices, the security of sensitive data such as secrets, API keys, and credentials becomes a significant concern. Continuous Integration and Continuous Deployment (CI/CD) pipelines automate software development but also require robust secret management. This paper presents an approach for securely managing secrets using JWT authentication between GitLab CI and HashiCorp Vault, providing a scalable, fine-grained, and secure solution for modern DevOps environments.
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Dachepally, Raju. "Continuous Integration and Continuous Delivery (CI/CD) Pipelines: Best Practices for Modern Enterprises." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 10 (2021): 1–8. https://doi.org/10.55041/ijsrem10912.

Testo completo
Abstract (sommario):
Continuous Integration (CI) and Continuous Delivery (CD) pipelines have become indispensable for modern enterprises aiming to achieve agile and scalable software development. This paper explores best practices for designing and implementing robust CI/CD pipelines, focusing on efficiency, security, and scalability. Key strategies include automated testing, pipeline as code, and integrating security measures. The paper features diagrams, flowcharts, and pseudocode to provide actionable insights. Future trends and challenges in CI/CD adoption are also discussed. Keywords CI/CD Pipelines, Automati
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Palavesam, Kuppusamy Vellamadam, Siva Venkatesh Arcot, Mahesh Vaijainthymala Krishnamoorthy, and Ebishdon G V. "Building Automated Security Pipeline for Containerized Microservices." Journal of Advances in Mathematics and Computer Science 40, no. 2 (2025): 53–66. https://doi.org/10.9734/jamcs/2025/v40i21969.

Testo completo
Abstract (sommario):
DevOps and microservices architectures are increasingly being adopted by organizations to improve software delivery agility, scalability, and speed. These techniques transform development workflows, resulting in faster innovation and deployment. However, they pose distinct security challenges, especially in containerized systems. Containers, as lightweight and scalable solutions, are essential to microservices; nonetheless, they are prone to hazards like misconfiguration, insecure images, and security vulnerabilities during execution. Addressing the security of these systems is critical for ma
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Sarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.

Testo completo
Abstract (sommario):
Security as Code (Sac) represents a transformative approach to addressing the critical challenge of balancing rapid software delivery with robust security measures. By embedding security directly into continuous integration and continuous deployment pipelines, Sac enables organizations to automate, standardize, and scale security practices throughout the software development lifecycle. This integration transforms security from a bottleneck into an enabler of development velocity while significantly enhancing risk posture. The article explores the theoretical framework of Sac, including its fou
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Zhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.

Testo completo
Abstract (sommario):
Pot-mode cultivation experiments were carried out to study the impacts of nitrogen(urea)fertilization in different level on Cadmium (Cd) accumulation, nitrate contents and nutritive values in Chinese cabbage, The results showed that: at different level of Cd artificial enriched soil, with applied urea increased, the accumulation of Cd in edible part of Chinese cabbage gradually decreased. Nitrate Contents in edible part have a positive correlation with the concentration of Cd in soil and the nitrogen fertilizer applied. In the natural soil (with contaminated Cd in concentration of 0.18 mg/kg),
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Weimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Belsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Hu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

ADEDAMOLA ABIODUN SOLANKE. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." World Journal of Advanced Research and Reviews 13, no. 2 (2022): 633–48. https://doi.org/10.30574/wjarr.2022.13.2.0121.

Testo completo
Abstract (sommario):
As organizations considered upscaling their DevOps adoption for speedy software delivery, it became imperative to integrate security into the CI/CD pipeline. The urgency of this practice cannot be overstated. Security should be embraced at every stage of the software development life cycle if only to meet compliance requirements in its strictest sense, especially where such requirements apply in industries like healthcare, finance, and government. DevSecOps turns the whole perspective toward incorporating security from Day 1 of the development cycle; that is, security is integrated and thus is
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 211–19. https://doi.org/10.32996/jcsts.2025.7.5.27.

Testo completo
Abstract (sommario):
The rapid evolution of cloud-native architectures and continuous deployment practices necessitates a fundamental shift in securing CI/CD pipelines. A novel zero trust framework introduces security controls as first-class entities within pipeline architecture, enforcing continuous verification throughout the software delivery lifecycle. The framework leverages policy-as-code, ephemeral build environments, and cryptographically verified artifact provenance to establish tamper-proof supply chains. Case studies demonstrate significant reductions in security incidents while improving deployment eff
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Bhosale, Pradeep. "A Comprehensive Guide to Secure Build Pipelines with Continuous Scanning." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–6. https://doi.org/10.55041/isjem00438.

Testo completo
Abstract (sommario):
As modern software engineering practices embrace faster release cycles and agile development methodologies, ensuring that security keeps pace has become a critical challenge. Traditional security reviews conducted at the end of the development lifecycle are no longer adequate. Continuous Integration/Continuous Delivery (CI/CD) pipelines and “shift-left” principles have given rise to continuous security scanning integrating security checks directly into the build and deployment processes. This approach not only detects vulnerabilities and misconfigurations earlier but also reduces remediation c
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Xia, Shiwei, Liangyun Song, Yi Wu, et al. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (2019): 900. http://dx.doi.org/10.3390/pr7120900.

Testo completo
Abstract (sommario):
Large-scale wind power integrated into power grids brings serious uncertainties and risks for power system safe operation, and it is imperative to evaluate power system security risk pertinent to high-level of uncertainties. In this paper, a comprehensive source–network–load probabilistic model, representing the typical uncertainties penetrated in power generation transmission consumption portion, is firstly set for power system operation. Afterwards an integrated LHS–CD approach based on the Latin hypercube sampling (LHS) and Cholesky decomposition (CD) is tailored to effectively conduct the
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Nardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.

Testo completo
Abstract (sommario):
IntroductionThe aim of the study is to estimate the disability insurance costs (social security system in Italy is financed by public expenditure) induced by patients with Inflammatory Bowel Disease (IBD) and specifically for Crohn's disease (CD) and Ulcerative Colitis (UC) between 2009 and 2015.MethodsWe analyzed the database about the disability insurance awards and the mean cost per benefit of the National Institute of Social Security (INPS) for two types of social security benefits: incapacity pensions (IP - for people without workability) and disability benefits (DB - for people with redu
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Ratnangi, Nirek. "Challenges and Solutions for Implementing CI/CD Pipelines in Linux-Based Development Frameworks." Journal of Scientific and Engineering Research 6, no. 6 (2019): 229–32. https://doi.org/10.5281/zenodo.13918897.

Testo completo
Abstract (sommario):
Continuous Integration (CI) and Continuous Deployment (CD) are critical methodologies in modern software development, enabling rapid and automated testing, integration, and deployment of code. Linux-based development environments, known for their flexibility, stability, and security, are popular in the software development community. However, the implementation of CI/CD pipelines in such environments brings about numerous challenges, including dependency management, security concerns, tool compatibility, and scalability.
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Reddy Pothu, Avinash. "Garlic Gate: Revolutionizing Application Security with Integrated Artificial Intelligence (AI) Across SDLC, CI/CD, and Advanced Methodologies." FMDB Transactions on Sustainable Computing Systems 2, no. 3 (2024): 119–30. https://doi.org/10.69888/ftscs.2024.000259.

Testo completo
Abstract (sommario):
Application security has become a top priority in SDLCs and CI/CD pipelines as cyber threats grow increasingly sophisticated. Meet Garlic Gate, a state-of-the-art, machine learning-powered framework that integrates effortlessly with SDLC and CI/CD processes to protect your applications. Its advanced architecture is designed to adapt to changing vulnerabilities, offering real-time threat detection, risk assessment, and dynamic learning to prevent or mitigate security issues. Using AI-driven algorithms, Garlic Gate overcomes the challenges of traditional application security methods, such as ine
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Zulunov, Ravshanbek Mamatovich. "Security tools in a continuous integration/continuous deployment pipeline." Research and implementation 2, no. 12 (2024): 237–44. https://doi.org/10.5281/zenodo.14557311.

Testo completo
Abstract (sommario):
Integrating a vulnerability database into a Continuous Integration / Continuous Deployment (CI/CD) pipeline is essential for enhancing the security posture of software development processes. This integration allows for automated identification and remediation of known vulnerabilities in applications and their dependencies. The process involves selecting a suitable vulnerability database, configuring API access, and embedding API calls within the CI/CD workflow to check for vulnerabilities at various stages of development. Additionally, it encompasses the analysis of vulnerability data, automat
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Naga Murali Krishna Koneru. "Integrating Security into CI/CD Pipelines: A DevSecOps Approach with SAST, DAST, and SCA Tools." International Journal of Science and Research Archive 3, no. 1 (2021): 250–65. https://doi.org/10.30574/ijsra.2021.3.1.0080.

Testo completo
Abstract (sommario):
Continuous Integration and Continuous Deployment (CI/CD), which was rapidly adopted by the software development industry, turned into a fast-paced process, causing new insecurity to be generated. This paper explains how we support the implementation of such DevSecOps by SDI (merging security in SD) with CI/CD process by combining SDI instruments of Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) and Software Composition Analysis (SCA) instruments. In this manner, security measures maintain equal development speed during development, while vulnerabilit
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Allam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3, no. 1 (2022): 86–97. https://doi.org/10.63282/3050-9246.ijetcsit-v3i1p110.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Nikolay, Pavlov. "NATO's Concept Development and Experimentation Approach in the EU's Common Security and Defence Policy? – An Institutional Isomorphism Perspective." Defence Studies 22, no. 2 (2021): 211–30. https://doi.org/10.1080/14702436.2021.2008248.

Testo completo
Abstract (sommario):
The paper analyses the Concept Development and Experimentation (CD&E) approach which has been developed and implemented in NATO over the last 20 years. NATO’s CD&E approach is explained as an organisational innovation and institutional response to external and internal pressures. Within the theoretical framing of institutional isomorphism, the paper analyses the adoption of CD&E in the European Union’s (EU) Common Security and Defence Policy (CSDP). The research hypothesis is that the EU will adopt and apply NATO’s CD&E approach in the EU’s defence plann
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.

Testo completo
Abstract (sommario):
The rapid evolution of cloud platform engineering has revolutionized secure deployment automation, continuous integration, and continuous deployment (CI/CD) practices, while introducing innovative risk mitigation strategies. The integration of Artificial Intelligence into cloud operations has transformed threat detection capabilities and automated security response mechanisms across distributed environments. Advanced automation frameworks have enhanced infrastructure management through self-healing mechanisms and intelligent configuration controls. Cloud-native security architectures implement
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Linsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.

Testo completo
Abstract (sommario):
The objective of this research is to assess whether the incremental information content of current cost (CC) income and constant dollar (CD) income is time-period specific. Based on work by Lim and Sunder (1990), we predict that CC (CD) income is more likely to exhibit incremental information content over CD (CC) income when the dispersion in annual price changes across industries is large (small). Evidence provided using FASB Statement No. 33 data is consistent with these predictions. That is, CD (CC) income is shown to exhibit incremental information content over CC (CD) income in the years
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Khattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.

Testo completo
Abstract (sommario):
Adopting best practices in project development is crucial for ensuring security, efficiency, and sustainability. Key practices include minimizing security risks by limiting access permissions, optimizing container images for faster deployments, and automating processes to reduce manual intervention. Additionally, effective configuration management, container health checks, and seamless integration of security tools within CI/CD pipelines help maintain system reliability and code quality. By leveraging cross-account access, choosing secure base images, and automating container restarts, project
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Zhang, Yingfan, Tingting Fu, Xueyao Chen, Hancheng Guo, Hongyi Li, and Bifeng Hu. "Modeling Cadmium Contents in a Soil–Rice System and Identifying Potential Controls." Land 11, no. 5 (2022): 617. http://dx.doi.org/10.3390/land11050617.

Testo completo
Abstract (sommario):
Cadmium (Cd) pollution in a soil–rice system is closely related to widely concerning issues, such as food security and health risk due to exposure to heavy metals. Therefore, modeling the Cd content in a soil–rice system and identifying related controls could provide critical information for ensuring food security and reducing related health risks. To archive this goal, in this study, we collected 217 pairs of soil–rice samples from three subareas in Zhejiang Province in the Yangtze River Delta of China. All soil–rice samples were air-dried and conducted for chemical analysis. The Pearson’s co
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Xu, Xinxin, Qingxian Mo, Zebin Cai, Qing Jiang, Danman Zhou, and Jicai Yi. "Promoters, Key Cis-Regulatory Elements, and Their Potential Applications in Regulation of Cadmium (Cd) in Rice." International Journal of Molecular Sciences 25, no. 24 (2024): 13237. https://doi.org/10.3390/ijms252413237.

Testo completo
Abstract (sommario):
Rice (Oryza sativa), a globally significant staple crop, is crucial for ensuring human food security due to its high yield and quality. However, the intensification of industrial activities has resulted in escalating cadmium (Cd) pollution in agricultural soils, posing a substantial threat to rice production. To address this challenge, this review comprehensively analyzes rice promoters, with a particular focus on identifying and characterizing key cis-regulatory elements (CREs) within them. By elucidating the roles of these CREs in regulating Cd stress response and accumulation in rice, we ai
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Bondalapati, Rahul Chowdary, and Satish Kumar Malaraju. "Enhancing Secure Deployment Automation in Cloud Environments: A Risk-Driven Approach to CI/CD Pipelines." European Journal of Computer Science and Information Technology 13, no. 38 (2025): 60–75. https://doi.org/10.37745/ejcsit.2013/vol13n386075.

Testo completo
Abstract (sommario):
This article presents a structured approach to integrating risk mitigation strategies into CI/CD pipelines for secure cloud deployments. The article introduces a comprehensive security framework that seamlessly embeds protection mechanisms throughout the deployment lifecycle while maintaining operational velocity. By leveraging automated security scanning, policy-as-code implementations, sophisticated IAM enforcement, and real-time anomaly detection, the article approach addresses the fundamental tension between deployment speed and security assurance. At the core of the article lies a dynamic
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Taiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.

Testo completo
Abstract (sommario):
This study offers a comprehensive analysis of automation in cloud-based DevOps, focusing on the role of Continuous Integration/Continuous Delivery (CI/CD) pipelines and Infrastructure as Code (IaC) in streamlining software development processes. Employing tools like Jenkins and Terraform, the research aims to demonstrate how automation can significantly enhance operational efficiency, scalability, and security in cloud deployments. Through a detailed examination of CI/CD components and their integration with IaC, this paper identifies key findings, including the reduction of manual errors, imp
Gli stili APA, Harvard, Vancouver, ISO e altri
43

David Akokodaripon and Godwin Nzeako. "Enhancing data engineering workflows with CI/CD process optimization using terraform: Reducing deployment time and operational overhead." World Journal of Advanced Research and Reviews 19, no. 3 (2023): 1639–46. https://doi.org/10.30574/wjarr.2023.19.3.1795.

Testo completo
Abstract (sommario):
This study explores the optimization of data engineering workflows through the integration of Continuous Integration and Continuous Deployment (CI/CD) practices, utilizing Terraform to reduce deployment time and operational overhead. The purpose of the research is to examine how Terraform's Infrastructure as Code (IaC) capabilities can streamline infrastructure provisioning and enhance the efficiency of data engineering processes. The study employed a comprehensive review of current CI/CD practices, analyzing the impact of Terraform on deployment efficiency, operational complexity, and regulat
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Bhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines." Babylonian Journal of Networking 2024 (August 20, 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.

Testo completo
Abstract (sommario):
Integrating shift-left security practices and automated vulnerability detection in container images is imperative for modern software development, given the dynamics and vulnerability landscape. This crucial methodology emphasizes security from the initial stages of integration in container-based environments like Docker and Kubernetes. The paper examines containerization security challenges, including image vulnerabilities, insecure configurations, runtime risks, weak orchestration security, and supply chain weaknesses, while stressing compliance with regulatory rules. It explores how this au
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Lin, Qi, Qing-Ping Yang, Bin Sun, et al. "Competitive coordination control of the AIE and micro states of supramolecular gel: an efficient approach for reversible dual-channel stimuli-response materials." Soft Matter 10, no. 42 (2014): 8427–32. http://dx.doi.org/10.1039/c4sm01288g.

Testo completo
Abstract (sommario):
The properties of Cd<sup>2+</sup>-coordinated metallogel (CdG) were controlled by the competitive coordination of Cd<sup>2+</sup>with gelator and I<sup>−</sup>. The CdG could act as I<sup>−</sup>sensing material and rewritable security display materials.
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Rida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.

Testo completo
Abstract (sommario):
Development, Security and Operations (DevSecOps) as part of Continuous Deployment (CD) or Continuous Delivery (CD) are considered a reliable link for communication and collaboration between development, security and operations teams. The philosophy of DevSecOps is defined as the ability to push new releases into production quickly and securely. We assume that DevSecOps brings new challenges, which primarily have a strong impact on decisions and organizational responsibilities within a company. We claim that PHP is the most commonly used back-end programming language for native applications, fr
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Srikanth, Prabhu Muthusamy, and Rama Krishna Inampudi. "Consent-Driven Continuous Delivery with Open Policy Agent and Spinnaker." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 4, no. 2 (2025): 102–12. https://doi.org/10.60087/jklst.v4.n2.009.

Testo completo
Abstract (sommario):
Continuous Delivery (CD) pipelines require robust governance to balance automation with compliance, security, and auditability. Traditional manual approval processes introduce bottlenecks, while static policy enforcement lacks flexibility. This research introduces a consent-driven CD framework integrating Open Policy Agent (OPA)—a declarative policy engine—with Spinnaker, a leading open-source CD platform. The framework leverages OPA's dynamic policy-as-code capabilities to automate deployment consents based on contextual rules (e.g., security scans, environment risks, or regulatory requiremen
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Yogeswara, Reddy Avuthu. "Balancing Speed and Security in DevOps Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.14183889.

Testo completo
Abstract (sommario):
The rapid adoption of DevOps practices has trans- formed software development by enabling frequent deploy- ments through Continuous Integration and Continuous Delivery (CI/CD) pipelines. However, achieving high deployment speed often introduces security risks, as faster releases reduce the time available for thorough testing and auditing. This paper investigates the inherent tension between speed and security in DevOps pipelines, identifying common challenges such as vulnerabilities slipping through rapid deployments, fragmented toolchains, and insufficient risk assessment.To address these cha
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Chirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.

Testo completo
Abstract (sommario):
The document outlines the detailed steps to establish a robust CI/CD pipeline for Salesforce, integrate version control, automate testing, and deployment tools. It outlines the Salesforce Deployment capabilities, and its limitations. Key features of Jenkins, its benefits in implementing a CICD pipeline for Salesforce. Best practices include using scratch orgs for development, maintaining a clean codebase, implementing a branching strategy, and automating deployments with CI tools like Jenkins. Ensure security and compliance by managing credentials securely and reviewing permissions. Monitor de
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Pochu, Sandeep, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram. "Zero Trust Principles in Cloud Security: A DevOps Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 660–71. https://doi.org/10.60087/jaigs.v6i1.302.

Testo completo
Abstract (sommario):
This research introduces Zero Trust Security models integrated into DevOps workflows. The paper outlines the implementation of security controls in GCP environments and evaluates their efficacy in mitigating risks associated with modern cloud infrastructures. The rise of cloud computing has revolutionized enterprise IT environments but has also introduced new security challenges. Zero Trust principles, which advocate "never trust, always verify," have emerged as a robust framework for securing cloud infrastructure. This paper explores the integration of Zero Trust principles within the DevOps
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!