{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:14Z","timestamp":1767581414334,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590879","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Security Enhancement using Image verification method to Secure Docker Containers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7023-5006","authenticated-orcid":false,"given":"Vivek","family":"Saxena","sequence":"first","affiliation":[{"name":"CSE, PIET Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0294-1245","authenticated-orcid":false,"given":"Deepika","family":"Saxena","sequence":"additional","affiliation":[{"name":"CSE, PU Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7573-8550","authenticated-orcid":false,"given":"Uday Pratap","family":"Singh","sequence":"additional","affiliation":[{"name":"CSE, PIET Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"volume-title":"North Carolina,USA{rshu, xgu, whenck}@ncsu.edu, A Study of Security Vulnerabilities on Docker Hub.","year":"2017","key":"e_1_3_2_1_1_1","unstructured":"RuiShu, XiaohuiGuandWilliamEnckNorth Carolina State University Raleigh, North Carolina,USA{rshu, xgu, whenck}@ncsu.edu, A Study of Security Vulnerabilities on Docker Hub. 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"Analysis of Docker Security, virtuarXiv: 1501.02967v1 [cs.CR]","author":"Thanh Bui Aalto University School of Science thanh.bui@aalto.fi","year":"2015","unstructured":"Thanh Bui Aalto University School of Science thanh.bui@aalto.fi, Analysis of Docker Security, virtuarXiv: 1501.02967v1 [cs.CR] 13 Jan 2015"},{"key":"e_1_3_2_1_3_1","unstructured":"Robail Yasrab 1 School of Computer Science and Information Technology University of Science andTechnology of China (USTC) Hefei China. Mitigating Docker Security Issues [DH 14] Docker hub.https:\/\/hub.docker.com\/"},{"key":"e_1_3_2_1_4_1","first-page":"73","volume-title":"Security of OSlevel virtualization technologies. In proceeding of the 2014 Nordsec conference","author":"Reshetova E.","year":"2014","unstructured":"E. Reshetova, J. Karhunen, T. Nyman, and N. Asokan.Security of OSlevel virtualization technologies. In proceeding of the 2014 Nordsec conference, pages 73- 93, Norway, 2014."},{"key":"e_1_3_2_1_5_1","volume-title":"Bringing new security featues to docker https:\/\/ opensource.com\/business\/14\/9\/security- for-docker. Available at: [Accessed","author":"Walsh D. J.","year":"2014","unstructured":"D. J. Walsh. Bringing new security featues to docker https:\/\/ opensource.com\/business\/14\/9\/security- for-docker. Available at: [Accessed 25 October 2014]"},{"key":"e_1_3_2_1_6_1","unstructured":"Docker: Network configuration. https:\/\/docs.docker.com\/articles \/networking [LC 14] Linux capabilities.https:\/\/linux.die.net\/man\/7\/capabilities"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.100"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society.2016.7854163"},{"key":"e_1_3_2_1_9_1","unstructured":"T. Combe A. Martin and R. Di Pietro \"Containers: Vulnerability Analysis\" tech. report Nokia Bell Labs. http:\/\/ricerca.mat.uniroma3.it \/users\/dipietro\/ containers_security.pdf [Online; accessed 29 Apr. 2017]."},{"key":"e_1_3_2_1_10_1","volume-title":"BanyanOps, 2015","author":"Jayanth G.","year":"2017","unstructured":"G. Jayanth, T. Desikan, and Y. Turner, \"Over 30% of Official Images in Docker Hub ContainHigh Priority Security Vulnerabilities\", BanyanOps, 2015, https:\/\/www.banyanops.com\/pdf\/BanyanOpsAnalyzingD ockerHubWhitePaper.pdf [Online; accessed 29Apr. 2017]."}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:45:31Z","timestamp":1767581131000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":10,"alternative-id":["10.1145\/3590837.3590879","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590879","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}