Enhancing configuration security with heterogeneous read points

Abstract Configuration files are widely used for customizing the status and behavior of cloud systems without modifying source code. The configurable system performs flexibly to meet different requirements. Several security risks come with the flexibility, since the configuration files are directly...

Full description

Saved in:
Bibliographic Details
Main Authors: Xianglong Kong, Qiyu Liu, Wei Huang, Jiayu Du, Hongfa Li, Wen Ji, Fan Zhang
Format: Article
Language:English
Published: SpringerOpen 2025-03-01
Series:Journal of Cloud Computing: Advances, Systems and Applications
Subjects:
Online Access:https://doi.org/10.1186/s13677-025-00740-1
Tags: Add Tag
No Tags, Be the first to tag this record!