Title,Source,Year,Criteria
Healthcare Ledger Management: A Blockchain and Machine Learning-Enabled Novel and Secure Architecture for Medical Industry,https://dx.doi.org/10.22967/HCIS.2022.12.055,2022,EC5: Serverless in the word’s strict context
An Ethereum Based e-Voting System,https://dx.doi.org/10.1007/978-3-031-58053-6_14,2024,EC5: Serverless in the word’s strict context
Repo: Application Agnostic and Oblivious In-Network Data Store,https://dx.doi.org/10.1109/MetaCom62920.2024.00052,2024,EC5: Serverless in the word’s strict context
Encrypted Cloud: A Software Solution for the Secure Use of Free-Access Cloud Storage Services,https://dx.doi.org/10.1007/978-3-319-67180-2_66,2018,EC6: Not a security solution for serverless
Go serverless: Securing cloud via serverless design patterns,https://www.usenix.org/conference/hotcloud18/presentation/hong,2018,EC6: Not a security solution for serverless
Harpocrates: Giving Out Your Secrets and Keeping Them Too,https://dx.doi.org/10.1109/SEC.2018.00015,2018,EC6: Not a security solution for serverless
A Function as a Service Based Fog Robotic System for Cognitive Robots,https://dx.doi.org/10.3390/app9214555,2019,EC6: Not a security solution for serverless
Addressing the Fragmentation Problem in Distributed and Decentralized Edge Computing: A Vision,https://dx.doi.org/10.1109/IC2E.2019.00030,2019,EC6: Not a security solution for serverless
Data Loss Prevention and Data Protection in Cloud Environments Based on Authentication Tokens,https://dx.doi.org/10.1109/CSCS.2019.00128,2019,EC6: Not a security solution for serverless
Osmotic Flow Deployment Leveraging FaaS Capabilities,https://dx.doi.org/10.1007/978-3-030-34914-1_37,2019,EC6: Not a security solution for serverless
CCoDaMiC: A framework for Coherent Coordination of Data Migration and Computation platforms,https://dx.doi.org/10.1016/j.future.2020.03.029,2020,EC6: Not a security solution for serverless
Forensic Analysis in Access Control,https://dx.doi.org/10.1145/3372297.3417860,2020,EC6: Not a security solution for serverless
Improved QoS at the Edge Using Serverless Computing to Deploy Virtual Network Functions,https://dx.doi.org/10.1109/JIOT.2020.3011057,2020,EC6: Not a security solution for serverless
Natural Language Processing on Diverse Data Layers Through Microservice Architecture,https://dx.doi.org/10.1109/INOCON50539.2020.9298027,2020,EC6: Not a security solution for serverless
Scheduling Methods to Reduce Response Latency of Function as a Service,https://dx.doi.org/10.1109/SBAC-PAD49847.2020.00028,2020,EC6: Not a security solution for serverless
The collection Virtual Machine,https://dx.doi.org/10.1145/3399666.3399911,2020,EC6: Not a security solution for serverless
tinyFaaS: A Lightweight FaaS Platform for Edge Environments,https://dx.doi.org/10.1109/ICFC49376.2020.00011,2020,EC6: Not a security solution for serverless
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources,https://dx.doi.org/10.1007/978-3-030-44038-1_81,2020,EC6: Not a security solution for serverless
Benchmarking Serverless Workloads on Kubernetes,https://dx.doi.org/10.1109/CCGrid51090.2021.00085,2021,EC6: Not a security solution for serverless
CoResident Evil: Covert Communication In The Cloud With Lambdas,https://dx.doi.org/10.1145/3442381.3450100,2021,EC6: Not a security solution for serverless
Denial of wallet—Defining a looming threat to serverless computing,https://dx.doi.org/10.1016/j.jisa.2021.102843,2021,EC6: Not a security solution for serverless
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks,https://dx.doi.org/10.1007/978-3-030-90022-9_11,2021,EC6: Not a security solution for serverless
On-demand Key Distribution for Cloud Networks,https://dx.doi.org/10.1109/ICIN51074.2021.9385528,2021,EC6: Not a security solution for serverless
Pilot-Edge: Distributed Resource Management Along the Edge-to-Cloud Continuum,https://dx.doi.org/10.1109/IPDPSW52791.2021.00130,2021,EC6: Not a security solution for serverless
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing,https://dx.doi.org/10.1145/3450569.3463567,2021,EC6: Not a security solution for serverless
Towards a Serverless Java Runtime,https://dx.doi.org/10.1109/ASE51524.2021.9678709,2021,EC6: Not a security solution for serverless
A Distributed Peer to Peer Identity and Access Management for the Osmotic Computing,https://dx.doi.org/10.1109/CCGrid54584.2022.00091,2022,EC6: Not a security solution for serverless
Automation of Forensic Analysis for AWS Aurora using EventBridge and Athena,https://dx.doi.org/10.1109/ICECA55336.2022.10009126,2022,EC6: Not a security solution for serverless
Dependent Function Embedding for Distributed Serverless Edge Computing,https://dx.doi.org/10.1109/TPDS.2021.3137380,2022,EC6: Not a security solution for serverless
Egeon: Software-Defined Data Protection for Object Storage,https://dx.doi.org/10.1109/CCGrid54584.2022.00019,2022,EC6: Not a security solution for serverless
iFaaSBus: A Security- and Privacy-Based Lightweight Framework for Serverless Computing Using IoT and Machine Learning,https://dx.doi.org/10.1109/TII.2021.3095466,2022,EC6: Not a security solution for serverless
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms,https://dx.doi.org/10.1145/3564625.3564634,2022,EC6: Not a security solution for serverless
QoS aware FaaS for Heterogeneous Edge-Cloud continuum,https://dx.doi.org/10.1109/CLOUD55607.2022.00023,2022,EC6: Not a security solution for serverless
Reducing response latency of composite functions-as-a-service through scheduling,https://dx.doi.org/10.1016/j.jpdc.2022.04.011,2022,EC6: Not a security solution for serverless
Serverless Computing Approach for Deploying Machine Learning Applications in Edge Layer,https://dx.doi.org/10.1109/ICOIN53446.2022.9687209,2022,EC6: Not a security solution for serverless
SoDa: A Serverless-Oriented Deadline-Aware Workflow Scheduling Engine for IoT Applications in Edge Clouds,https://dx.doi.org/10.1155/2022/7862911,2022,EC6: Not a security solution for serverless
SyncMesh,https://dx.doi.org/10.1145/3517206.3526275,2022,EC6: Not a security solution for serverless
A Fast Cold-Start Solution: Container Space Reuse Based on Resource Isolation,https://dx.doi.org/10.3390/electronics12112515,2023,EC6: Not a security solution for serverless
A Microservice and Serverless Architecture for Secure IoT System,https://dx.doi.org/10.3390/s23104868,2023,EC6: Not a security solution for serverless
A Mobile Health Application Using Geolocation for Behavioral Activity Tracking,https://dx.doi.org/10.3390/s23187917,2023,EC6: Not a security solution for serverless
A Node Agent for Fast and Safe Execution of Computing Tasks under Kubernetes,https://dx.doi.org/10.1109/MICCIS58901.2023.00020,2023,EC6: Not a security solution for serverless
A Serverless Federated Learning Service Ecosystem for Multi-Cloud Collaborative Environments,https://dx.doi.org/10.1109/CloudNet59005.2023.10490057,2023,EC6: Not a security solution for serverless
DataFlower: Exploiting the Data-flow Paradigm for Serverless Workflow Orchestration,https://dx.doi.org/10.1145/3623278.3624755,2023,EC6: Not a security solution for serverless
Deadline Sensitive And Function Placement In Multi-tier Serverless Platform,https://dx.doi.org/10.1109/ICIT59216.2023.10335789,2023,EC6: Not a security solution for serverless
DeFaaS: Decentralized Function-as-a-Service for Emerging dApps and Web3,https://dx.doi.org/10.1109/ICBC56567.2023.10174945,2023,EC6: Not a security solution for serverless
Design of intelligent monitoring of loneliness in the elderly using a serverless architecture with real-time communication API,https://dx.doi.org/10.3233/THC-235006,2023,EC6: Not a security solution for serverless
FaaSCell: A Case for Intra-node Resource Management: Work-In-Progress,https://dx.doi.org/10.1145/3592533.3592812,2023,EC6: Not a security solution for serverless
Firestore: The NoSQL Serverless Database for the Application Developer,https://dx.doi.org/10.1109/ICDE55515.2023.00259,2023,EC6: Not a security solution for serverless
HTTPA/2: A Trusted End-to-End Protocol for Web Services,https://dx.doi.org/10.1007/978-3-031-28073-3_55,2023,EC6: Not a security solution for serverless
Hyron: A New Approach for Automating the Network ACL Delivery Pipeline,https://dx.doi.org/10.1109/ICCCN58024.2023.10230146,2023,EC6: Not a security solution for serverless
Internet of Edges Architecture for 6G,https://dx.doi.org/10.1109/6GNet58894.2023.10317768,2023,EC6: Not a security solution for serverless
ITS Based on Deep Graph Convolutional Fraud Detection Network Blockchain-Enabled Fog-Cloud,https://dx.doi.org/10.1109/TITS.2022.3147852,2023,EC6: Not a security solution for serverless
Least-Privilege Calls to Amazon Web Services,https://dx.doi.org/10.1109/TDSC.2022.3171740,2023,EC6: Not a security solution for serverless
Object as a Service (OaaS): Enabling Object Abstraction in Serverless Clouds,https://dx.doi.org/10.1109/CLOUD60044.2023.00035,2023,EC6: Not a security solution for serverless
Online Container Scheduling for Data-intensive Applications in Serverless Edge Computing,https://dx.doi.org/10.1109/INFOCOM53939.2023.10229034,2023,EC6: Not a security solution for serverless
Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS),https://dx.doi.org/10.1109/ACCESS.2023.3324817,2023,EC6: Not a security solution for serverless
Privacy-Preserving Serverless Edge Learning With Decentralized Small-Scale Mobile Data,https://dx.doi.org/10.1109/MNET.135.2200611,2023,EC6: Not a security solution for serverless
Restricted Boltzmann Machine Assisted Secure Serverless Edge System for Internet of Medical Things,https://dx.doi.org/10.1109/JBHI.2022.3178660,2023,EC6: Not a security solution for serverless
Serverless Data Protection in Cloud,https://dx.doi.org/10.1109/ISCON57294.2023.10112206,2023,EC6: Not a security solution for serverless
Serverless Scheduling Policies based on Cost Analysis,https://dx.doi.org/10.4204/EPTCS.392.3,2023,EC6: Not a security solution for serverless
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture,https://dx.doi.org/10.1109/QRS60937.2023.00069,2023,EC6: Not a security solution for serverless
Zero-Trust Model for Smart Manufacturing Industry,https://dx.doi.org/10.3390/app13010221,2023,EC6: Not a security solution for serverless
LLMaaS: Serving Large Language Models on Trusted Serverless Computing Platforms,https://dx.doi.org/10.1109/TAI.2024.3429480,2024,EC6: Not a security solution for serverless
A Proposal of JYAGUCHI Computing Platform to Realize ClouEdge (Cloud-Edge) and Serverless Architecture,https://dx.doi.org/10.6688/JISE.202401_40(1).0006,2024,EC6: Not a security solution for serverless
Are Unikernels Ready for Serverless on the Edge?,https://dx.doi.org/10.1109/IC2E61754.2024.00022,2024,EC6: Not a security solution for serverless
Artifact: Wasimoff: Distributed Computation Offloading Using WebAssembly in the Browser,https://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502812,2024,EC6: Not a security solution for serverless
Authorizing Access to Edge Resources at Wire Speed using 5G Device Authentication,https://dx.doi.org/10.1109/HPSR62440.2024.10635919,2024,EC6: Not a security solution for serverless
EdgeBench: A Workflow-Based Benchmark for Edge Computing,https://dx.doi.org/10.1007/978-3-031-54053-0_12,2024,EC6: Not a security solution for serverless
Evaluating the Performance Resilience of Serverless Applications using Chaos Engineering,https://dx.doi.org/10.1109/QRS-C63300.2024.00172,2024,EC6: Not a security solution for serverless
Improved Construction Scheme of Fully-Extended Call Graph to Enhance Observability of Serverless-Based Applications,https://dx.doi.org/10.1109/SEAI62072.2024.10674561,2024,EC6: Not a security solution for serverless
Limitations and Opportunities of Modern Hardware Isolation Mechanisms,https://www.usenix.org/conference/atc24/presentation/chen-xiangdong,2024,EC6: Not a security solution for serverless
Machine learning-based intelligent security framework for secure cloud key management,https://dx.doi.org/10.1007/s10586-024-04288-8,2024,EC6: Not a security solution for serverless
Membrane - Safe and Performant Data Access Controls in Apache Spark in the Presence of Imperative Code,https://dx.doi.org/10.14778/3685800.3685808,2024,EC6: Not a security solution for serverless
Optimizing Completion Time of Requests in Serverless Computing,https://dx.doi.org/10.1007/s10922-024-09800-4,2024,EC6: Not a security solution for serverless
Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds,https://dx.doi.org/10.1109/ICBC59979.2024.10634394,2024,EC6: Not a security solution for serverless
SimEnc: A High-Performance Similarity-Preserving Encryption Approach for Deduplication of Encrypted Docker Images,https://www.usenix.org/conference/atc24/presentation/sun,2024,EC6: Not a security solution for serverless
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems,https://dx.doi.org/10.1007/s12559-024-10310-3,2024,EC6: Not a security solution for serverless
Towards Inter-Service Data Flow Analysis of Serverless Applications,https://dx.doi.org/10.1109/SANER60148.2024.00072,2024,EC6: Not a security solution for serverless
VECA: Reliable and Confidential Resource Clustering for Volunteer Edge-Cloud Computing,https://dx.doi.org/10.1109/IC2E61754.2024.00024,2024,EC6: Not a security solution for serverless
Narrowing the Gap Between Serverless and its State with Storage Functions,https://dx.doi.org/10.1145/3357223.3362723,2019,EC7: Serverless mechanism with security assumptions
BabelFish: Fusing Address Translations for Containers,https://dx.doi.org/10.1109/ISCA45697.2020.00049,2020,EC7: Serverless mechanism with security assumptions
Demonstrating the Practicality of Unikernels to Build a Serverless Platform at the Edge,https://dx.doi.org/10.1109/CloudCom49646.2020.00001,2020,EC7: Serverless mechanism with security assumptions
funcX: A Federated Function Serving Fabric for Science,https://dx.doi.org/10.1145/3369583.3392683,2020,EC7: Serverless mechanism with security assumptions
"Location, Proximity, Affinity – The key factors in FaaS",https://dx.doi.org/10.36244/ICJ.2020.4.3,2020,EC7: Serverless mechanism with security assumptions
BabelFish: Fusing Address Translations for Containers,https://dx.doi.org/10.1109/MM.2021.3073194,2021,EC7: Serverless mechanism with security assumptions
Faastlane: Accelerating function-as-a-service workflows,https://www.usenix.org/conference/atc21/presentation/kotni,2021,EC7: Serverless mechanism with security assumptions
Fireworks,https://dx.doi.org/10.1145/3492321.3519581,2022,EC7: Serverless mechanism with security assumptions
funcX: Federated Function as a Service for Science,https://dx.doi.org/10.1109/TPDS.2022.3208767,2022,EC7: Serverless mechanism with security assumptions
Help Rather Than Recycle: Alleviating Cold Startup in Serverless Computing Through Inter-Function Container Sharing,https://www.usenix.org/conference/atc22/presentation/li-zijun-help,2022,EC7: Serverless mechanism with security assumptions
Implementing ChaCha based crypto primitives on programmable SmartNICs,https://dx.doi.org/10.1145/3528082.3544833,2022,EC7: Serverless mechanism with security assumptions
RunD: A Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing,https://www.usenix.org/conference/atc22/presentation/li-zijun-rund,2022,EC7: Serverless mechanism with security assumptions
Sentinel,https://dx.doi.org/10.1145/3565382.3565880,2022,EC7: Serverless mechanism with security assumptions
Want more unikernels?,https://dx.doi.org/10.1145/3542929.3563473,2022,EC7: Serverless mechanism with security assumptions
eScience Serverless Data Storage Services in the Edge-Fog-Cloud Continuum,https://dx.doi.org/10.1109/e-Science58273.2023.10254882,2023,EC7: Serverless mechanism with security assumptions
Flock: Towards Multitasking Virtual Machines for Function-as-a-Service,https://dx.doi.org/10.1109/TC.2023.3288751,2023,EC7: Serverless mechanism with security assumptions
Function as a Function,https://dx.doi.org/10.1145/3620678.3624648,2023,EC7: Serverless mechanism with security assumptions
Hardware-Accelerated FaaS for the Edge-Cloud Continuum,https://dx.doi.org/10.1109/ICNP59255.2023.10355594,2023,EC7: Serverless mechanism with security assumptions
On-demand Container Loading in AWS Lambda,https://www.usenix.org/system/files/atc23-brooker.pdf,2023,EC7: Serverless mechanism with security assumptions
Patronus: High-Performance and Protective Remote Memory,https://www.usenix.org/conference/fast23/presentation/yan,2023,EC7: Serverless mechanism with security assumptions
Accelerating Cold Start of Thread-level Sandbox Using Snapshot and tfork,https://dx.doi.org/10.1109/ICPADS63350.2024.00046,2024,EC7: Serverless mechanism with security assumptions
Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications,https://dx.doi.org/10.1145/3605098.3636029,2024,EC7: Serverless mechanism with security assumptions
DirectFaaS: A Clean-Slate Network Architecture for Efficient Serverless Chain Communications,https://dx.doi.org/10.1145/3589334.3645333,2024,EC7: Serverless mechanism with security assumptions
Enabling Remote Management of FaaS Endpoints with Globus Compute Multi-User Endpoints,https://dx.doi.org/10.1145/3626203.3670612,2024,EC7: Serverless mechanism with security assumptions
FunLess: Functions-as-a-Service for Private Edge Cloud Systems,https://dx.doi.org/10.1109/ICWS62655.2024.00114,2024,EC7: Serverless mechanism with security assumptions
Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies,https://dx.doi.org/10.3390/fi16030091,2024,EC7: Serverless mechanism with security assumptions
PRICELESS: Privacy enhanced AI‐driven scalable framework for IoT applications in serverless edge computing environments,https://dx.doi.org/10.1002/itl2.510,2024,EC7: Serverless mechanism with security assumptions
Reducing cold start delay in serverless computing using lightweight virtual machines,https://dx.doi.org/10.1016/j.jnca.2024.104030,2024,EC7: Serverless mechanism with security assumptions
Rethinking the Networking Stack for Serverless Environments: A Sidecar Approach,https://dx.doi.org/10.1145/3698038.3698561,2024,EC7: Serverless mechanism with security assumptions
Security computing resource allocation based on deep reinforcement learning in serverless multi-cloud edge computing,https://dx.doi.org/10.1016/j.future.2023.09.016,2024,EC7: Serverless mechanism with security assumptions
TeleVM: A Lightweight Virtual Machine for RISC-V Architecture,https://dx.doi.org/10.1109/LCA.2024.3394835,2024,EC7: Serverless mechanism with security assumptions
"Understanding Network Startup for Secure Containers in Multi-Tenant Clouds: Performance, Bottleneck and Optimization",https://dx.doi.org/10.1145/3646547.3688436,2024,EC7: Serverless mechanism with security assumptions
Wasimoff: Distributed Computation Offloading Using WebAssembly in the Browser,https://dx.doi.org/10.1109/PerComWorkshops59983.2024.10503392,2024,EC7: Serverless mechanism with security assumptions
Rule-Based Resource Matchmaking for Composite Application Deployments across IoT-Fog-Cloud Continuums,https://dx.doi.org/10.1109/UCC48980.2020.00053,2020,EC8: Could be applied to serverless
Stratus: Clouds with microarchitectural resource management,https://www.usenix.org/conference/hotcloud20/presentation/razavi,2020,EC8: Could be applied to serverless
Enclavisor: A Hardware-software Co-design for Enclaves on Untrusted Cloud,https://dx.doi.org/10.1109/TC.2020.3019704,2021,EC8: Could be applied to serverless
Code Layering for the Detection of Network Covert Channels in Agentless Systems,https://dx.doi.org/10.1109/TNSM.2022.3176752,2022,EC8: Could be applied to serverless
FaDO: FaaS Functions and Data Orchestrator for Multiple Serverless Edge-Cloud Clusters,https://dx.doi.org/10.1109/ICFEC54809.2022.00010,2022,EC8: Could be applied to serverless
SecMesh: An efficient information security method for stream processing in edge-fog-cloud,https://dx.doi.org/10.1145/3569507.3569509,2022,EC8: Could be applied to serverless
Enhancing Microservices Security with Token-Based Access Control Method,https://dx.doi.org/10.3390/s23063363,2023,EC8: Could be applied to serverless
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments,https://dx.doi.org/10.1109/EuroSP60621.2024.00025,2024,EC8: Could be applied to serverless
"Lightweight Fault Isolation: Practical, Efficient, and Secure Software Sandboxing",https://dx.doi.org/10.1145/3620665.3640408,2024,EC8: Could be applied to serverless
ZKWASM: A ZKSNARK WASM Emulator,https://dx.doi.org/10.1109/TSC.2024.3422798,2024,EC8: Could be applied to serverless
Making Serverless Computing More Serverless,https://dx.doi.org/10.1109/CLOUD.2018.00064,2018,"EC9: Theoretical vision, not a realization"
Towards a Security-Aware Benchmarking Framework for Function-as-a-Service,https://dx.doi.org/10.5220/0006817606660669,2018,"EC9: Theoretical vision, not a realization"
Toward Software-Defined Moving Target Defense for Secure Service Deployment Enhanced with a User-Defined Orchestration,https://dx.doi.org/10.1145/3440943.3444725,2020,"EC9: Theoretical vision, not a realization"
Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud,https://dx.doi.org/10.1145/3460120.3485372,2021,"EC9: Theoretical vision, not a realization"
Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions,https://dx.doi.org/10.1109/GLOBECOM48099.2022.10001386,2022,"EC9: Theoretical vision, not a realization"
Distributed Information Flow Control in Serverless Computing,https://dx.doi.org/10.1109/ICSSIT53264.2022.9716444,2022,"EC9: Theoretical vision, not a realization"
Femto-containers,https://dx.doi.org/10.1145/3528535.3565242,2022,EC10: Security proposal based on the serverless principles
ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies,https://dx.doi.org/10.1109/TPS-ISA56441.2022.00040,2022,EC10: Security proposal based on the serverless principles
Serverless Computing Security: Protecting Application Logic,https://dx.doi.org/10.1109/ISSC49989.2020.9180214,2020,EC11: Lack of theoretical and practical relevance
Accelerate and secure serverless networks with QUIC,https://dx.doi.org/10.1145/3485983.3493350,2021,EC11: Lack of theoretical and practical relevance
Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing,https://dx.doi.org/10.1007/978-3-031-05412-9_10,2022,EC11: Lack of theoretical and practical relevance
Workflow Sensitive Access Management in Serverless Computing,https://dx.doi.org/10.1109/iSSSC56467.2022.10051255,2022,EC11: Lack of theoretical and practical relevance
BlockFaaS: Blockchain-enabled Serverless Computing Framework for AI-driven IoT Healthcare Applications,https://dx.doi.org/10.1007/s10723-023-09691-w,2023,EC11: Lack of theoretical and practical relevance
DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing,https://dx.doi.org/10.1007/s11277-023-10189-7,2023,EC11: Lack of theoretical and practical relevance
Scalable Model-Based Decentralized Applications in the Cloud Using Certificates and Blockchains,https://dx.doi.org/10.1109/PKIA58446.2023.10262768,2023,EC11: Lack of theoretical and practical relevance
Securing the Flow: Security and Privacy Tools for Flow-based Programming,https://dx.doi.org/10.1145/3600160.3605089,2023,EC11: Lack of theoretical and practical relevance
SMAF: a secure and makespan-aware framework for executing serverless workflows,https://dx.doi.org/10.1007/s11432-021-3408-y,2023,EC11: Lack of theoretical and practical relevance
An Event-B Formal Model for Access Control and Resource Management of Serverless Apps,https://dx.doi.org/10.1007/978-3-031-63790-2_11,2024,EC11: Lack of theoretical and practical relevance
DbAPI: A Backend-as-a-Service Platform for Rapid Deployment of Cloud Services,https://dx.doi.org/10.23919/IST-Africa63983.2024.10569490,2024,EC11: Lack of theoretical and practical relevance
Defending AWS Cloud Infrastructure Using Deceptive Defense,https://dx.doi.org/10.1109/ICOECA62351.2024.00061,2024,EC11: Lack of theoretical and practical relevance
Detection of Anomalous e2e Encrypted Function Invocation in FaaS using Zero-Knowledge Proofs,https://dx.doi.org/10.1109/NetSoft60951.2024.10588930,2024,EC11: Lack of theoretical and practical relevance
Enhancing Deployment and Performance Measurement of Serverless Cloud Microservices with Warm Start,https://dx.doi.org/10.1109/ICCCNT61001.2024.10725992,2024,EC11: Lack of theoretical and practical relevance
Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms,https://dx.doi.org/10.1007/978-981-97-1961-7_6,2024,EC11: Lack of theoretical and practical relevance
SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing,https://dx.doi.org/10.3390/electronics13163246,2024,EC11: Lack of theoretical and practical relevance
TrapShield: Enhancing Security and Privacy in Serverless Workflows using Honeypots by Robust Adversary Penalization,https://dx.doi.org/10.1109/IC2E61754.2024.00034,2024,EC11: Lack of theoretical and practical relevance
TruFaaS - Trust Verification Framework for FaaS,https://dx.doi.org/10.1007/978-981-97-1274-8_20,2024,EC11: Lack of theoretical and practical relevance