{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:11:14Z","timestamp":1769047874496,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,21]]},"DOI":"10.1109\/acit58437.2023.10275654","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:43:37Z","timestamp":1697564617000},"page":"420-425","source":"Crossref","is-referenced-by-count":22,"title":["Software for Improve the Security of Kubernetes-based CI\/CD Pipeline"],"prefix":"10.1109","author":[{"given":"Ruslan","family":"Shevchuk","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]},{"given":"Mikolaj","family":"Karpinski","sequence":"additional","affiliation":[{"name":"University of Applied Sciences in Nowy Sacz,Department of Computer Science,Nowy Sacz,Poland"}]},{"given":"Mykhailo","family":"Kasianchuk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Ihor","family":"Yakymenko","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Cyber Security,Ternopil,Ukraine"}]},{"given":"Andriy","family":"Melnyk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]},{"given":"Roman","family":"Tykhyi","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7942-7"},{"key":"ref35","article-title":"YAML Ain't Markup Language (YAMLTM) Version 1.2","author":"ben-kiki","year":"2023","journal-title":"NASA gov"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD55607.2022.00022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT55679.2022.9865718"},{"key":"ref15","first-page":"11091","article-title":"Analysis of CI\/CD Application in Kubernetes Architecture","volume":"71","author":"janani","year":"2022","journal-title":"Mathematical Statistician and Engineering Applications"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7452-1_15"},{"key":"ref14","author":"leszko","year":"2019","journal-title":"Continuous Delivery with Docker and Jenkins Create Secure Applications by Building Complete CI\/CD Pipelines 2nd Edition"},{"key":"ref36","author":"burns","year":"2022","journal-title":"Kubernetes Up and Running"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACITT.2019.8779899"},{"key":"ref30","article-title":"The Method of Factorizing Multi-Digit Numbers Based on the Operation of Adding Odd Numbers","author":"kasianchuk","year":"2023","journal-title":"CEUR org"},{"key":"ref11","author":"dame","year":"2022","journal-title":"The Kubernetes Operator Framework Book The Kubernetes Operator Framework Book Overcome Complex Kubernetes Cluster Management Challenges with Automation Toolkits"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS53615.2022.9668504"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7809-3_5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3094726"},{"key":"ref2","author":"sethi","year":"2020","journal-title":"Automating Software Code Deployment Using Continuous Integration and Continuous Delivery Pipeline for Business Intelligence Solutions"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685629"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10285-5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8876-4_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSNIKOM56551.2022.10034883"},{"key":"ref38","author":"zakas","year":"2005","journal-title":"Professional Javascript for Web Developers"},{"key":"ref19","author":"olzak","year":"2022","journal-title":"How vulnerabilities in Kubernetes are potential attack vectors"},{"key":"ref18","article-title":"Kubernetes: List of security vulnerabilities","year":"2022","journal-title":"Cvedetails com [Online] Available"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482526"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app12063023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IC3SIS54991.2022.9885293"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5850-7_5"},{"key":"ref20","article-title":"Hackers exploit Tesla's AWS servers to mine cryptocurrency","author":"barker","year":"2018","journal-title":"Security Australia"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7951-9_8"},{"key":"ref41","author":"fedosejev","year":"2015","journal-title":"React js Essentials"},{"key":"ref22","article-title":"IBM Cloud Kubernetes Service is not affected by Kubernetes `kubectl cp` directory traversal vulnerability (CVE-2019-11246)","year":"2019","journal-title":"IBM com"},{"key":"ref21","article-title":"Nvd - cve-2019-5736","year":"2022","journal-title":"nist gov"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8876-4_11"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7942-7_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75650-9_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.47992\/IJCSBE.2581.6942.0263"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"45","DOI":"10.30534\/ijacst\/2023\/011242023","article-title":"Cloud Container Service Orchestrated with Kubernetes: A State-of-the-Art Technology Review and Application Proposal","volume":"12","author":"naydenov","year":"2023","journal-title":"International Journal of Advances in Computer Science and Technology"},{"key":"ref9","first-page":"4968","article-title":"A Comparison on Continuous Integration and Continuous Deployment (CI\/CD) on Cloud Based on Various Deployment and Testing Strategies","volume":"9","author":"singh","year":"2021","journal-title":"International Journal of Applied Science and Engineering Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9781119564409.ch7"},{"key":"ref3","first-page":"65","article-title":"Kubernetes Vulnerabilities","author":"binnie","year":"2021","journal-title":"Cloud Native Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9303-4_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.12.004"},{"key":"ref40","author":"pham","year":"2020","journal-title":"Developing Back-End of a Web Application with NestJS Framework Case Integrify Oy's Student Management System"}],"event":{"name":"2023 13th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Wroc\u0142aw, Poland","start":{"date-parts":[[2023,9,21]]},"end":{"date-parts":[[2023,9,23]]}},"container-title":["2023 13th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275066\/10275327\/10275654.pdf?arnumber=10275654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T18:58:00Z","timestamp":1699297080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/acit58437.2023.10275654","relation":{},"subject":[],"published":{"date-parts":[[2023,9,21]]}}}