{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:43:36Z","timestamp":1769035416645,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331568","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Container Orchestration Impact on SPIFFE Identity Artifacts: A Performance Analysis of Docker vs Kubernetes"],"prefix":"10.1109","author":[{"given":"Henrique Z.","family":"Cochak","sequence":"first","affiliation":[{"name":"Graduate Program in Applied Computing (PPGCAP), Santa Catarina State University (UDESC),Brazil"}]},{"given":"Charles C.","family":"Miers","sequence":"additional","affiliation":[{"name":"Graduate Program in Applied Computing (PPGCAP), Santa Catarina State University (UDESC),Brazil"}]},{"given":"Marco A.","family":"Marques","sequence":"additional","affiliation":[{"name":"Universidade de S&#x00E3;o Paulo (USP),Laboratory of Computer Networks and Architecture (LARC),Brazil"}]},{"given":"Marcos A.","family":"Simpl\u00edcio","sequence":"additional","affiliation":[{"name":"Universidade de S&#x00E3;o Paulo (USP),Laboratory of Computer Networks and Architecture (LARC),Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5220\/0005785501370146"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.93"},{"key":"ref3","author":"Feldman","year":"2020","journal-title":"Solving the bottom turtle - a SPIFFE way to establish trust in your infrastructure via universal identity"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102788"},{"key":"ref5","article-title":"Profiling lightweight container platforms: Mi-crok8s and k3s in comparison to kubernetes","volume-title":"Central European Workshop on Services and their Composition","author":"Bohm","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s23084008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3578244.3583726"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3578244.3583737"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57916-5_25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0012634400003711"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom62794.2024.00015"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-207","volume-title":"Zero trust architecture","author":"Rose","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-55v1"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8446","article-title":"The transport layer security (tls) protocol version 1.3","volume-title":"Internet Engineering Task Force, RFC 8446","author":"Rescorla","year":"2018"},{"key":"ref15","first-page":"89842","article-title":"Performance evaluation of container networking","volume":"10","author":"Zheng","year":"2022","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/nca.2015.49"},{"key":"ref18","volume-title":"Cluster networking","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.11"},{"key":"ref20","volume-title":"Cilium performance analysis","year":"2024"},{"issue":"3","key":"ref21","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/JSAC.2007.070407","article-title":"Understanding open vswitch: A performance perspective","volume":"37","author":"Li","year":"2019","journal-title":"IEEE Journal on Selected Areas in Communications"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331568.pdf?arnumber=11331568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:35:07Z","timestamp":1768980907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331568","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}