Enhancing configuration security with heterogeneous read points

Configuration files are widely used for customizing the status and behavior of cloud systems without modifying source code. The configurable system performs flexibly to meet different requirements. Several security risks come with the flexibility, since the configuration files are directly accessibl...

Full description

Saved in:
Bibliographic Details
Published inJournal of cloud computing : advances, systems and applications Vol. 14; no. 1; pp. 16 - 14
Main Authors Kong, Xianglong, Liu, Qiyu, Huang, Wei, Du, Jiayu, Li, Hongfa, Ji, Wen, Zhang, Fan
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2025
Springer Nature B.V
SpringerOpen
Subjects
Online AccessGet full text

Cover

Loading…