Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: CD Security.

Artykuły w czasopismach na temat „CD Security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „CD Security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Pełny tekst źródła
Streszczenie:
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
Style APA, Harvard, Vancouver, ISO itp.
3

Researcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.

Pełny tekst źródła
Streszczenie:
This comprehensive article explores the critical challenge of securing Continuous Integration and Continuous Deployment (CI/CD) pipelines in modern software development. It addresses the common security threats faced by organizations, including credential leaks, supply chain attacks, and unauthorized access, while offering actionable strategies to mitigate these risks. The paper delves into best practices for enhancing CI/CD security, covering crucial aspects such as secret management, encryption techniques, secure CI/CD tools, immutable infrastructure, and comprehensive security testing metho
Style APA, Harvard, Vancouver, ISO itp.
4

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Pełny tekst źródła
Streszczenie:
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps—combining security with the DevOps process—has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can
Style APA, Harvard, Vancouver, ISO itp.
5

Ho-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.

Pełny tekst źródła
Streszczenie:
Continuous Integration (CI) and Continuous Deployment (CD) are important aspects in software engineering today. In modern software production organizational models, CI/CD pipeline has become a mandatory element to improve speed and reduce team effort in developing, integrating, and deploying. In the context of increasing information security risks, deploying security tools for the CI/CD pipeline has become an inevitable trend. Deploying information security tools throughout the pipeline according to the "Shift Left" philosophy will help detect information security issues early for timely handl
Style APA, Harvard, Vancouver, ISO itp.
6

Sumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.

Pełny tekst źródła
Streszczenie:
Zero Trust architecture represents a fundamental shift in securing cloud infrastructure, particularly within CI/CD pipelines where traditional perimeter-based security approaches increasingly fail against sophisticated threats. This technical article explores how implementing Zero Trust principles—"never trust, always verify"—creates robust protection throughout the software delivery lifecycle. The implementation spans across multiple dimensions: securing modern CI/CD tools including GitHub Actions, Azure DevOps, and GitLab; establishing comprehensive identity and access management with just-i
Style APA, Harvard, Vancouver, ISO itp.
7

Ponaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.

Pełny tekst źródła
Streszczenie:
Security vulnerabilities in software development can lead to severe risks if not addressed promptly. By adopting a shift-left approach and implementing gating mechanisms in Continuous Integration/Continuous Delivery (CI/CD) pipelines, organizations can mitigate the impact of high and critical vulnerabilities early in the Software Development Life Cycle (SDLC). This paper discusses a practical methodology for integrating security gates into the CI/CD pipeline to prevent the release of software with critical security flaws. Keywords —Vulnerability Management, Shift-Left Security, CI/CD Pipeline,
Style APA, Harvard, Vancouver, ISO itp.
8

Tipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Satya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ponaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.

Pełny tekst źródła
Streszczenie:
This paper discusses a systematic approach to integrating Static Application Security Testing (SAST), Software Composition Analysis (SCA), Code Coverage, and Code Quality Checks into Continuous Integration/Continuous Delivery (CI/CD) pipelines. Modern CI/CD pipelines accelerate software delivery but introduce significant security and quality challenges. By incorporating SAST and SCA for security testing, along with code coverage and quality checks, organizations can prevent code vulnerabilities and ensure the maintainability and reliability of their applications. This approach helps developmen
Style APA, Harvard, Vancouver, ISO itp.
11

Devashish Ghanshyambhai Patel. "Enhancing CI/CD security with provenance metadata and supply chain best practices." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 019–32. https://doi.org/10.30574/wjaets.2025.16.1.1181.

Pełny tekst źródła
Streszczenie:
Continuous Integration and Continuous Delivery (CI/CD) pipelines have transformed modern software development by enabling faster release cycles, increased collaboration, and improved automation. However, these benefits also introduce complex security challenges, particularly within software supply chains. As the sophistication of cyber threats evolves, adversaries are increasingly targeting CI/CD environments to infiltrate trusted software delivery processes. This journal article presents a comprehensive exploration of how integrating provenance metadata and adopting supply chain security best
Style APA, Harvard, Vancouver, ISO itp.
12

Samuel Jesupelumi Owoade, Abel Uzoka, Joshua Idowu Akerele, and Pascal Ugochukwu Ojukwu. "Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines." World Journal of Engineering and Technology Research 3, no. 2 (2024): 011–21. http://dx.doi.org/10.53346/wjetr.2024.3.2.0059.

Pełny tekst źródła
Streszczenie:
In the fast-evolving landscape of financial services, data security and regulatory compliance are critical challenges that cloud-based solutions can address effectively. This paper explores the implementation of cloud-based compliance and data security solutions in financial applications, with a specific focus on using Continuous Integration and Continuous Deployment (CI/CD) pipelines. By integrating CI/CD pipelines, financial institutions can streamline deployment processes, ensuring rapid delivery while maintaining compliance with regulatory frameworks such as GDPR, PCI-DSS, and SOC 2. The C
Style APA, Harvard, Vancouver, ISO itp.
13

Rohith Aitharaju. "Policy-driven infrastructure hardening using CI/CD pipelines in enterprise environments." International Journal of Science and Research Archive 7, no. 1 (2022): 591–602. https://doi.org/10.30574/ijsra.2022.7.1.0280.

Pełny tekst źródła
Streszczenie:
The way modern businesses are speeding up software implementation using CI/CD, securely managing infrastructure automatically has never been more essential. Old methods of protecting systems, made by hand and only done when problems arise, cannot catch up to what DevOps pipelines require. This research looks at using Policy-as-Code (PaC) in CI/CD pipelines to apply policy-driven hardening to infrastructure which helps maintain compliance, consistency and robustness. The research further examines basic ideas like Infrastructure as Code (IaC), managing configurations and the important security b
Style APA, Harvard, Vancouver, ISO itp.
14

Akilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.

Pełny tekst źródła
Streszczenie:
In the era of DevOps, the integration of Continuous Integration and Continuous Deployment (CI/CD) pipelines has revolutionized the software development lifecycle, ensuring rapid and reliable delivery of applications. However, this accelerated development pace introduces significant security challenges, particularly in maintaining the security posture of local servers. This paper investigates the integration of vulnerability scanning into CI/CD pipelines, aiming to enhance the security of applications and underlying infrastructure throughout the development process. We explore various vulnerabi
Style APA, Harvard, Vancouver, ISO itp.
15

Yang, Shuai. "The Impact of Continuous Integration and Continuous Delivery on Software Development Efficiency." Journal of Computer, Signal, and System Research 2, no. 3 (2025): 59–68. https://doi.org/10.71222/pzvfqm21.

Pełny tekst źródła
Streszczenie:
This paper explores the impact of Continuous Integration (CI) and Continuous Delivery (CD) on software development efficiency. By examining the core principles, practices, and benefits of CI/CD, the study highlights how these practices contribute to faster development cycles, improved code quality, and enhanced collaboration across development teams. The paper discusses the challenges organizations face when implementing CI/CD, such as tool selection, cultural resistance, and security concerns, and provides practical recommendations for overcoming these obstacles. Additionally, it offers insig
Style APA, Harvard, Vancouver, ISO itp.
16

Baladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.

Pełny tekst źródła
Streszczenie:
Implementing RESTful microservices across various cloud platforms necessitates automation to guarantee consistency, security, and scalability. Continuous Integration/Continuous Deployment (CI/CD) pipelines optimize the integration, testing, and deployment of services, thereby minimizing manual intervention and operational risks. This study introduces a comprehensive framework for fully automated CI/CD processes, integrating Infrastructure as Code (IaC), security protocols, and monitoring software solutions. The proposal tackles crucial issues like multi-cloud compatibility, vendor lock-in, and
Style APA, Harvard, Vancouver, ISO itp.
17

Kamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.

Pełny tekst źródła
Streszczenie:
As organizations increasingly adopt DevOps practices, the security of sensitive data such as secrets, API keys, and credentials becomes a significant concern. Continuous Integration and Continuous Deployment (CI/CD) pipelines automate software development but also require robust secret management. This paper presents an approach for securely managing secrets using JWT authentication between GitLab CI and HashiCorp Vault, providing a scalable, fine-grained, and secure solution for modern DevOps environments.
Style APA, Harvard, Vancouver, ISO itp.
18

Dachepally, Raju. "Continuous Integration and Continuous Delivery (CI/CD) Pipelines: Best Practices for Modern Enterprises." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 10 (2021): 1–8. https://doi.org/10.55041/ijsrem10912.

Pełny tekst źródła
Streszczenie:
Continuous Integration (CI) and Continuous Delivery (CD) pipelines have become indispensable for modern enterprises aiming to achieve agile and scalable software development. This paper explores best practices for designing and implementing robust CI/CD pipelines, focusing on efficiency, security, and scalability. Key strategies include automated testing, pipeline as code, and integrating security measures. The paper features diagrams, flowcharts, and pseudocode to provide actionable insights. Future trends and challenges in CI/CD adoption are also discussed. Keywords CI/CD Pipelines, Automati
Style APA, Harvard, Vancouver, ISO itp.
19

Palavesam, Kuppusamy Vellamadam, Siva Venkatesh Arcot, Mahesh Vaijainthymala Krishnamoorthy, and Ebishdon G V. "Building Automated Security Pipeline for Containerized Microservices." Journal of Advances in Mathematics and Computer Science 40, no. 2 (2025): 53–66. https://doi.org/10.9734/jamcs/2025/v40i21969.

Pełny tekst źródła
Streszczenie:
DevOps and microservices architectures are increasingly being adopted by organizations to improve software delivery agility, scalability, and speed. These techniques transform development workflows, resulting in faster innovation and deployment. However, they pose distinct security challenges, especially in containerized systems. Containers, as lightweight and scalable solutions, are essential to microservices; nonetheless, they are prone to hazards like misconfiguration, insecure images, and security vulnerabilities during execution. Addressing the security of these systems is critical for ma
Style APA, Harvard, Vancouver, ISO itp.
20

Sarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.

Pełny tekst źródła
Streszczenie:
Security as Code (Sac) represents a transformative approach to addressing the critical challenge of balancing rapid software delivery with robust security measures. By embedding security directly into continuous integration and continuous deployment pipelines, Sac enables organizations to automate, standardize, and scale security practices throughout the software development lifecycle. This integration transforms security from a bottleneck into an enabler of development velocity while significantly enhancing risk posture. The article explores the theoretical framework of Sac, including its fou
Style APA, Harvard, Vancouver, ISO itp.
21

Zhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.

Pełny tekst źródła
Streszczenie:
Pot-mode cultivation experiments were carried out to study the impacts of nitrogen(urea)fertilization in different level on Cadmium (Cd) accumulation, nitrate contents and nutritive values in Chinese cabbage, The results showed that: at different level of Cd artificial enriched soil, with applied urea increased, the accumulation of Cd in edible part of Chinese cabbage gradually decreased. Nitrate Contents in edible part have a positive correlation with the concentration of Cd in soil and the nitrogen fertilizer applied. In the natural soil (with contaminated Cd in concentration of 0.18 mg/kg),
Style APA, Harvard, Vancouver, ISO itp.
22

Weimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Belsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Hu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

ADEDAMOLA ABIODUN SOLANKE. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." World Journal of Advanced Research and Reviews 13, no. 2 (2022): 633–48. https://doi.org/10.30574/wjarr.2022.13.2.0121.

Pełny tekst źródła
Streszczenie:
As organizations considered upscaling their DevOps adoption for speedy software delivery, it became imperative to integrate security into the CI/CD pipeline. The urgency of this practice cannot be overstated. Security should be embraced at every stage of the software development life cycle if only to meet compliance requirements in its strictest sense, especially where such requirements apply in industries like healthcare, finance, and government. DevSecOps turns the whole perspective toward incorporating security from Day 1 of the development cycle; that is, security is integrated and thus is
Style APA, Harvard, Vancouver, ISO itp.
26

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 211–19. https://doi.org/10.32996/jcsts.2025.7.5.27.

Pełny tekst źródła
Streszczenie:
The rapid evolution of cloud-native architectures and continuous deployment practices necessitates a fundamental shift in securing CI/CD pipelines. A novel zero trust framework introduces security controls as first-class entities within pipeline architecture, enforcing continuous verification throughout the software delivery lifecycle. The framework leverages policy-as-code, ephemeral build environments, and cryptographically verified artifact provenance to establish tamper-proof supply chains. Case studies demonstrate significant reductions in security incidents while improving deployment eff
Style APA, Harvard, Vancouver, ISO itp.
27

Bhosale, Pradeep. "A Comprehensive Guide to Secure Build Pipelines with Continuous Scanning." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–6. https://doi.org/10.55041/isjem00438.

Pełny tekst źródła
Streszczenie:
As modern software engineering practices embrace faster release cycles and agile development methodologies, ensuring that security keeps pace has become a critical challenge. Traditional security reviews conducted at the end of the development lifecycle are no longer adequate. Continuous Integration/Continuous Delivery (CI/CD) pipelines and “shift-left” principles have given rise to continuous security scanning integrating security checks directly into the build and deployment processes. This approach not only detects vulnerabilities and misconfigurations earlier but also reduces remediation c
Style APA, Harvard, Vancouver, ISO itp.
28

Xia, Shiwei, Liangyun Song, Yi Wu, et al. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (2019): 900. http://dx.doi.org/10.3390/pr7120900.

Pełny tekst źródła
Streszczenie:
Large-scale wind power integrated into power grids brings serious uncertainties and risks for power system safe operation, and it is imperative to evaluate power system security risk pertinent to high-level of uncertainties. In this paper, a comprehensive source–network–load probabilistic model, representing the typical uncertainties penetrated in power generation transmission consumption portion, is firstly set for power system operation. Afterwards an integrated LHS–CD approach based on the Latin hypercube sampling (LHS) and Cholesky decomposition (CD) is tailored to effectively conduct the
Style APA, Harvard, Vancouver, ISO itp.
29

Nardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.

Pełny tekst źródła
Streszczenie:
IntroductionThe aim of the study is to estimate the disability insurance costs (social security system in Italy is financed by public expenditure) induced by patients with Inflammatory Bowel Disease (IBD) and specifically for Crohn's disease (CD) and Ulcerative Colitis (UC) between 2009 and 2015.MethodsWe analyzed the database about the disability insurance awards and the mean cost per benefit of the National Institute of Social Security (INPS) for two types of social security benefits: incapacity pensions (IP - for people without workability) and disability benefits (DB - for people with redu
Style APA, Harvard, Vancouver, ISO itp.
30

Ratnangi, Nirek. "Challenges and Solutions for Implementing CI/CD Pipelines in Linux-Based Development Frameworks." Journal of Scientific and Engineering Research 6, no. 6 (2019): 229–32. https://doi.org/10.5281/zenodo.13918897.

Pełny tekst źródła
Streszczenie:
Continuous Integration (CI) and Continuous Deployment (CD) are critical methodologies in modern software development, enabling rapid and automated testing, integration, and deployment of code. Linux-based development environments, known for their flexibility, stability, and security, are popular in the software development community. However, the implementation of CI/CD pipelines in such environments brings about numerous challenges, including dependency management, security concerns, tool compatibility, and scalability.
Style APA, Harvard, Vancouver, ISO itp.
31

Reddy Pothu, Avinash. "Garlic Gate: Revolutionizing Application Security with Integrated Artificial Intelligence (AI) Across SDLC, CI/CD, and Advanced Methodologies." FMDB Transactions on Sustainable Computing Systems 2, no. 3 (2024): 119–30. https://doi.org/10.69888/ftscs.2024.000259.

Pełny tekst źródła
Streszczenie:
Application security has become a top priority in SDLCs and CI/CD pipelines as cyber threats grow increasingly sophisticated. Meet Garlic Gate, a state-of-the-art, machine learning-powered framework that integrates effortlessly with SDLC and CI/CD processes to protect your applications. Its advanced architecture is designed to adapt to changing vulnerabilities, offering real-time threat detection, risk assessment, and dynamic learning to prevent or mitigate security issues. Using AI-driven algorithms, Garlic Gate overcomes the challenges of traditional application security methods, such as ine
Style APA, Harvard, Vancouver, ISO itp.
32

Zulunov, Ravshanbek Mamatovich. "Security tools in a continuous integration/continuous deployment pipeline." Research and implementation 2, no. 12 (2024): 237–44. https://doi.org/10.5281/zenodo.14557311.

Pełny tekst źródła
Streszczenie:
Integrating a vulnerability database into a Continuous Integration / Continuous Deployment (CI/CD) pipeline is essential for enhancing the security posture of software development processes. This integration allows for automated identification and remediation of known vulnerabilities in applications and their dependencies. The process involves selecting a suitable vulnerability database, configuring API access, and embedding API calls within the CI/CD workflow to check for vulnerabilities at various stages of development. Additionally, it encompasses the analysis of vulnerability data, automat
Style APA, Harvard, Vancouver, ISO itp.
33

Naga Murali Krishna Koneru. "Integrating Security into CI/CD Pipelines: A DevSecOps Approach with SAST, DAST, and SCA Tools." International Journal of Science and Research Archive 3, no. 1 (2021): 250–65. https://doi.org/10.30574/ijsra.2021.3.1.0080.

Pełny tekst źródła
Streszczenie:
Continuous Integration and Continuous Deployment (CI/CD), which was rapidly adopted by the software development industry, turned into a fast-paced process, causing new insecurity to be generated. This paper explains how we support the implementation of such DevSecOps by SDI (merging security in SD) with CI/CD process by combining SDI instruments of Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) and Software Composition Analysis (SCA) instruments. In this manner, security measures maintain equal development speed during development, while vulnerabilit
Style APA, Harvard, Vancouver, ISO itp.
34

Allam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3, no. 1 (2022): 86–97. https://doi.org/10.63282/3050-9246.ijetcsit-v3i1p110.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Nikolay, Pavlov. "NATO's Concept Development and Experimentation Approach in the EU's Common Security and Defence Policy? – An Institutional Isomorphism Perspective." Defence Studies 22, no. 2 (2021): 211–30. https://doi.org/10.1080/14702436.2021.2008248.

Pełny tekst źródła
Streszczenie:
The paper analyses the Concept Development and Experimentation (CD&E) approach which has been developed and implemented in NATO over the last 20 years. NATO’s CD&E approach is explained as an organisational innovation and institutional response to external and internal pressures. Within the theoretical framing of institutional isomorphism, the paper analyses the adoption of CD&E in the European Union’s (EU) Common Security and Defence Policy (CSDP). The research hypothesis is that the EU will adopt and apply NATO’s CD&E approach in the EU’s defence plann
Style APA, Harvard, Vancouver, ISO itp.
36

Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.

Pełny tekst źródła
Streszczenie:
The rapid evolution of cloud platform engineering has revolutionized secure deployment automation, continuous integration, and continuous deployment (CI/CD) practices, while introducing innovative risk mitigation strategies. The integration of Artificial Intelligence into cloud operations has transformed threat detection capabilities and automated security response mechanisms across distributed environments. Advanced automation frameworks have enhanced infrastructure management through self-healing mechanisms and intelligent configuration controls. Cloud-native security architectures implement
Style APA, Harvard, Vancouver, ISO itp.
37

Linsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.

Pełny tekst źródła
Streszczenie:
The objective of this research is to assess whether the incremental information content of current cost (CC) income and constant dollar (CD) income is time-period specific. Based on work by Lim and Sunder (1990), we predict that CC (CD) income is more likely to exhibit incremental information content over CD (CC) income when the dispersion in annual price changes across industries is large (small). Evidence provided using FASB Statement No. 33 data is consistent with these predictions. That is, CD (CC) income is shown to exhibit incremental information content over CC (CD) income in the years
Style APA, Harvard, Vancouver, ISO itp.
38

Khattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.

Pełny tekst źródła
Streszczenie:
Adopting best practices in project development is crucial for ensuring security, efficiency, and sustainability. Key practices include minimizing security risks by limiting access permissions, optimizing container images for faster deployments, and automating processes to reduce manual intervention. Additionally, effective configuration management, container health checks, and seamless integration of security tools within CI/CD pipelines help maintain system reliability and code quality. By leveraging cross-account access, choosing secure base images, and automating container restarts, project
Style APA, Harvard, Vancouver, ISO itp.
39

Zhang, Yingfan, Tingting Fu, Xueyao Chen, Hancheng Guo, Hongyi Li, and Bifeng Hu. "Modeling Cadmium Contents in a Soil–Rice System and Identifying Potential Controls." Land 11, no. 5 (2022): 617. http://dx.doi.org/10.3390/land11050617.

Pełny tekst źródła
Streszczenie:
Cadmium (Cd) pollution in a soil–rice system is closely related to widely concerning issues, such as food security and health risk due to exposure to heavy metals. Therefore, modeling the Cd content in a soil–rice system and identifying related controls could provide critical information for ensuring food security and reducing related health risks. To archive this goal, in this study, we collected 217 pairs of soil–rice samples from three subareas in Zhejiang Province in the Yangtze River Delta of China. All soil–rice samples were air-dried and conducted for chemical analysis. The Pearson’s co
Style APA, Harvard, Vancouver, ISO itp.
40

Xu, Xinxin, Qingxian Mo, Zebin Cai, Qing Jiang, Danman Zhou, and Jicai Yi. "Promoters, Key Cis-Regulatory Elements, and Their Potential Applications in Regulation of Cadmium (Cd) in Rice." International Journal of Molecular Sciences 25, no. 24 (2024): 13237. https://doi.org/10.3390/ijms252413237.

Pełny tekst źródła
Streszczenie:
Rice (Oryza sativa), a globally significant staple crop, is crucial for ensuring human food security due to its high yield and quality. However, the intensification of industrial activities has resulted in escalating cadmium (Cd) pollution in agricultural soils, posing a substantial threat to rice production. To address this challenge, this review comprehensively analyzes rice promoters, with a particular focus on identifying and characterizing key cis-regulatory elements (CREs) within them. By elucidating the roles of these CREs in regulating Cd stress response and accumulation in rice, we ai
Style APA, Harvard, Vancouver, ISO itp.
41

Bondalapati, Rahul Chowdary, and Satish Kumar Malaraju. "Enhancing Secure Deployment Automation in Cloud Environments: A Risk-Driven Approach to CI/CD Pipelines." European Journal of Computer Science and Information Technology 13, no. 38 (2025): 60–75. https://doi.org/10.37745/ejcsit.2013/vol13n386075.

Pełny tekst źródła
Streszczenie:
This article presents a structured approach to integrating risk mitigation strategies into CI/CD pipelines for secure cloud deployments. The article introduces a comprehensive security framework that seamlessly embeds protection mechanisms throughout the deployment lifecycle while maintaining operational velocity. By leveraging automated security scanning, policy-as-code implementations, sophisticated IAM enforcement, and real-time anomaly detection, the article approach addresses the fundamental tension between deployment speed and security assurance. At the core of the article lies a dynamic
Style APA, Harvard, Vancouver, ISO itp.
42

Taiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.

Pełny tekst źródła
Streszczenie:
This study offers a comprehensive analysis of automation in cloud-based DevOps, focusing on the role of Continuous Integration/Continuous Delivery (CI/CD) pipelines and Infrastructure as Code (IaC) in streamlining software development processes. Employing tools like Jenkins and Terraform, the research aims to demonstrate how automation can significantly enhance operational efficiency, scalability, and security in cloud deployments. Through a detailed examination of CI/CD components and their integration with IaC, this paper identifies key findings, including the reduction of manual errors, imp
Style APA, Harvard, Vancouver, ISO itp.
43

David Akokodaripon and Godwin Nzeako. "Enhancing data engineering workflows with CI/CD process optimization using terraform: Reducing deployment time and operational overhead." World Journal of Advanced Research and Reviews 19, no. 3 (2023): 1639–46. https://doi.org/10.30574/wjarr.2023.19.3.1795.

Pełny tekst źródła
Streszczenie:
This study explores the optimization of data engineering workflows through the integration of Continuous Integration and Continuous Deployment (CI/CD) practices, utilizing Terraform to reduce deployment time and operational overhead. The purpose of the research is to examine how Terraform's Infrastructure as Code (IaC) capabilities can streamline infrastructure provisioning and enhance the efficiency of data engineering processes. The study employed a comprehensive review of current CI/CD practices, analyzing the impact of Terraform on deployment efficiency, operational complexity, and regulat
Style APA, Harvard, Vancouver, ISO itp.
44

Bhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines." Babylonian Journal of Networking 2024 (August 20, 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.

Pełny tekst źródła
Streszczenie:
Integrating shift-left security practices and automated vulnerability detection in container images is imperative for modern software development, given the dynamics and vulnerability landscape. This crucial methodology emphasizes security from the initial stages of integration in container-based environments like Docker and Kubernetes. The paper examines containerization security challenges, including image vulnerabilities, insecure configurations, runtime risks, weak orchestration security, and supply chain weaknesses, while stressing compliance with regulatory rules. It explores how this au
Style APA, Harvard, Vancouver, ISO itp.
45

Lin, Qi, Qing-Ping Yang, Bin Sun, et al. "Competitive coordination control of the AIE and micro states of supramolecular gel: an efficient approach for reversible dual-channel stimuli-response materials." Soft Matter 10, no. 42 (2014): 8427–32. http://dx.doi.org/10.1039/c4sm01288g.

Pełny tekst źródła
Streszczenie:
The properties of Cd<sup>2+</sup>-coordinated metallogel (CdG) were controlled by the competitive coordination of Cd<sup>2+</sup>with gelator and I<sup>−</sup>. The CdG could act as I<sup>−</sup>sensing material and rewritable security display materials.
Style APA, Harvard, Vancouver, ISO itp.
46

Rida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.

Pełny tekst źródła
Streszczenie:
Development, Security and Operations (DevSecOps) as part of Continuous Deployment (CD) or Continuous Delivery (CD) are considered a reliable link for communication and collaboration between development, security and operations teams. The philosophy of DevSecOps is defined as the ability to push new releases into production quickly and securely. We assume that DevSecOps brings new challenges, which primarily have a strong impact on decisions and organizational responsibilities within a company. We claim that PHP is the most commonly used back-end programming language for native applications, fr
Style APA, Harvard, Vancouver, ISO itp.
47

Srikanth, Prabhu Muthusamy, and Rama Krishna Inampudi. "Consent-Driven Continuous Delivery with Open Policy Agent and Spinnaker." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 4, no. 2 (2025): 102–12. https://doi.org/10.60087/jklst.v4.n2.009.

Pełny tekst źródła
Streszczenie:
Continuous Delivery (CD) pipelines require robust governance to balance automation with compliance, security, and auditability. Traditional manual approval processes introduce bottlenecks, while static policy enforcement lacks flexibility. This research introduces a consent-driven CD framework integrating Open Policy Agent (OPA)—a declarative policy engine—with Spinnaker, a leading open-source CD platform. The framework leverages OPA's dynamic policy-as-code capabilities to automate deployment consents based on contextual rules (e.g., security scans, environment risks, or regulatory requiremen
Style APA, Harvard, Vancouver, ISO itp.
48

Yogeswara, Reddy Avuthu. "Balancing Speed and Security in DevOps Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.14183889.

Pełny tekst źródła
Streszczenie:
The rapid adoption of DevOps practices has trans- formed software development by enabling frequent deploy- ments through Continuous Integration and Continuous Delivery (CI/CD) pipelines. However, achieving high deployment speed often introduces security risks, as faster releases reduce the time available for thorough testing and auditing. This paper investigates the inherent tension between speed and security in DevOps pipelines, identifying common challenges such as vulnerabilities slipping through rapid deployments, fragmented toolchains, and insufficient risk assessment.To address these cha
Style APA, Harvard, Vancouver, ISO itp.
49

Chirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.

Pełny tekst źródła
Streszczenie:
The document outlines the detailed steps to establish a robust CI/CD pipeline for Salesforce, integrate version control, automate testing, and deployment tools. It outlines the Salesforce Deployment capabilities, and its limitations. Key features of Jenkins, its benefits in implementing a CICD pipeline for Salesforce. Best practices include using scratch orgs for development, maintaining a clean codebase, implementing a branching strategy, and automating deployments with CI tools like Jenkins. Ensure security and compliance by managing credentials securely and reviewing permissions. Monitor de
Style APA, Harvard, Vancouver, ISO itp.
50

Pochu, Sandeep, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram. "Zero Trust Principles in Cloud Security: A DevOps Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 660–71. https://doi.org/10.60087/jaigs.v6i1.302.

Pełny tekst źródła
Streszczenie:
This research introduces Zero Trust Security models integrated into DevOps workflows. The paper outlines the implementation of security controls in GCP environments and evaluates their efficacy in mitigating risks associated with modern cloud infrastructures. The rise of cloud computing has revolutionized enterprise IT environments but has also introduced new security challenges. Zero Trust principles, which advocate "never trust, always verify," have emerged as a robust framework for securing cloud infrastructure. This paper explores the integration of Zero Trust principles within the DevOps
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!