Slide 54
Slide 54 text
© Hitachi, Ltd. 2022. All rights reserved.
参考文献
1. Chandramouli, Ramaswamy. "Microservices-based application systems." NIST Special Publication 800.204 (2019)
2. Chandramouli, Ramaswamy, and Zack Butcher. "Building secure microservices-based applications using service-mesh
architecture." NIST Special Publication 800.204A (2020)
3. Chandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. "Attribute-based Access Control for Microservices-based
Applications Using a Service Mesh." NIST Special Publication 800.204B (2021)
4. Chandramouli, Ramaswamy. "Implementation of DevSecOps for a Microservices-based Application with Service Mesh."
NIST Special Publication 800.204C (2022)
5. "NGAC Vs RBAC Vs ABAC" Tetrate https://www.tetrate.io/blog/rbac-vs-abac-vs-ngac/ (accessed July 23, 2022)
6. "Service meshes are on the rise — but greater understanding and experience are required",
Cloud Native Computing Foundation (2022)
7. "Istio" https://istio.io/ (accessed July 23, 2022)
8. "Envoy documentation — envoy 1.24.0-dev-6c7513 documentation"
https://www.envoyproxy.io/docs/envoy/latest/ (accessed July 23, 2022)
9. Christian E. Posta and Rinor Maloku, "Istio in Action" Manning Publications (2022)
10. Jianfei Hu, "Automate Istio Best security practice", IstioCon 2022 (2022)
11. Yannis Zarkadas, "Kubeflow: Authentication with Istio + Dex" Arrikto
https://www.arrikto.com/blog/kubeflow/news/kubeflow-authentication-with-istio-dex/ (accessed July 23, 2022)
12. Luke Addison. "Istio OIDC Authentication" Jetstack Blog https://www.jetstack.io/blog/istio-oidc/ (2021)
53