Open Access
Issue
ITM Web Conf.
Volume 69, 2024
International Conference on Mobility, Artificial Intelligence and Health (MAIH2024)
Article Number 04018
Number of page(s) 6
Section Transactions
DOI https://doi.org/10.1051/itmconf/20246904018
Published online 13 December 2024
  1. B. Jambunathan and D. Y. Kalpana, “Design of DevOps solution for managing multi-cloud distributed environment,” Int. J. Eng. Technol., 7, no. 33, pp. 637–641, (2018). [Google Scholar]
  2. O. O. Abiona, J. Oladapo, N. Oluwole, O. C. Oyeniran, A. Okechukwu, and N. Abiola, “The emergence and importance of DevSecOps: Integrating and reviewing security practices within the DevOps pipeline,” World J. Adv. Eng. Technol. Sci., 11, no. 2, pp. 127–133, (2024). doi: 10.30574/wiaets.2024.11.2.0093. [Google Scholar]
  3. J. Kuruvilla, “8 Common DevSecOps Challenges and How to Overcome Them,” Adaptavist, Dec. 13, 2021. [Online]. Available: https://www.adaptavist.com/blog/8-common-devsecops-challenges-and-how-to-overcome-them. [Google Scholar]
  4. V. Prasad, “Building a Strong DevSecOps Culture in a Hybrid and Multi-Cloud Environment,” AppSec Engineer, updated Dec. 26, 2023. [Online]. Available: https://www.appsecengineer.com/blog/building-a-strong-devsecops-culture-in-a-hybrid-and-multi-cloud-environment. [Google Scholar]
  5. R. Badam and Team Qentelli, “DevSecOps Challenges at Scale,” Qentelli, [Online]. Available: https://qentelli.com/thought-leadership/insights/devsecops-challenges-scale. [Google Scholar]
  6. D. H. A. Goncalves, DevSecOps for web applications: a case study, Master’s Thesis, Instituto Superior de Engenharia do Porto, (June 2022). [Google Scholar]
  7. A. Kharchuk and O. Boyko, “Web Application Development Challenges,” SPD Tech, Sep. 9, 2023. [Online]. Available: https://spd.tech/web-development/web-application-development-challenges/. [Google Scholar]
  8. C. Cerbulescu and M. Cerbulescu, “N-Tier applications: XML-XSLT in data traffic optimization,” presented at the 7th Int. Conf. Dev. Appl. Syst., Suceava, Romania, May 27-29, 2004, pp. 423–425. [Google Scholar]
  9. S. Sotnik, V. Manakov, and V. Lyashenko, “pReview: Overview: PHP and MySQL features for creating modern web projects,” Int. J. Acad. Inf. Syst. Res. (LJ.AISR), Jan. 2023. [Online]. Available: https://openarchive.nure.ua/server/api/core/bitstreams/99c2a8e9-aefd-47d4-a06f-838650b760db/content. [Google Scholar]
  10. E. Katz, “What is the DevSecOps Maturity Model (DSOMM)?,” SpectralOps, Feb. 15, 2024. [Online]. Available: https://spectralops.io/blog/what-is-the-devsecops-maturity-model-dsomm/. [Google Scholar]
  11. Veritis, “Pros and Cons of DevSecOps,” Jul. 2022. [Online]. Available: https://veritis.com/wp-content/uploads/2022/07/Pros-and-Cons-of-DevSecOps.pdf. [Google Scholar]
  12. R. N. Rajapakse, M. Zahedi, M. Ali Babar, and H. Shen, “Challenges and solutions when adopting DevSecOps: A systematic review,” 2021. [PDF]. [Google Scholar]
  13. A. Singh and A. Aggarwal, “Securing microservice CI/CD pipelines in cloud deployments through Infrastructure as Code implementation approach and best practices,” J. Sci. Technol., vol. 3, no. 3, pp. 51–65, May 2022. [Online]. Available: https://thesciencebrigade.com/ist/article/view/203. [Google Scholar]
  14. O. B. Abiola and O. G. Olufemi, “An enhanced CI/CD pipeline: A DevSecOps approach,” Int. J. Comput. Appl., vol. 184, no. 48, pp. 8–13, Feb. 2023. doi: 10.5120/ijca2023922594. [Google Scholar]
  15. R. N. Rajapakse, M. Zahedi, M. A. Babar, and H. Shen, “Challenges and solutions when adopting DevSecOps: A systematic review,” Inf. Softw. Technol., vol. 141, p. 106700, 2022. doi: 10.1016/j.infsof.2021.106700. [Google Scholar]
  16. C. Woody, T. Chick, A. Reffett, S. Pavetti, R. Laughlin, B. Frye, and M. Bandor, DevSecOps pipeline for complex software intensive systems: Addressing the cybersecurity challenges, Carnegie Mellon Univ., Pittsburgh, PA, USA, 2020. [Google Scholar]
  17. B. Jammeh, “DevSecOps: Security expertise a key to automated testing in CI/CD pipeline,” Bournemouth Univ., 2020. [Online]. Available: https://www.researchgate.net/publication/347441415. [Google Scholar]
  18. V. Dakic, J. Redzepagic, and M. Basic, “CI/CD toolset security,” in Proc. 33rdDAAAMInt. Symp. Intell. Manuf. Autom., Vienna, Austria, Oct. 27-28, 2022, pp. 161–164. [Google Scholar]
  19. B. A. Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” Tech. Rep., 2007. [Google Scholar]
  20. S. Easterbrook, J. Singer, M.-A. Storey, and D. Damian, “Selecting empirical methods for software engineering research,” in Guide to Advanced Empirical Software Engineering, F. Shull, J. Singer, and D. K. Sjøberg, Eds., London, U.K.: Springer, 2008, pp. 285–311. [CrossRef] [Google Scholar]
  21. E. Paradis, B. O'Brien, L. Nimmon, G. Bandiera, and M. A. Martimianakis, “Design: Selection of data collection methods,” J. Grad. Med. Educ., vol. 8, no. 2, pp. 263–264, May 2016. doi: 10.4300/JGME-D-16-00098.1. [Google Scholar]
  22. E. Paradis, B. O'Brien, L. Nimmon, G. Bandiera, and M. A. Martimianakis, “Design: Selection of data collection methods,” J. Grad. Med. Educ., vol. 8, no. 2, pp. 263–264, May 2016. doi: 10.4300/JGME-D-16-00098.1. [Google Scholar]
  23. V. Braun and V. Clarke, “Using thematic analysis in psychology,” Qual. Res. Psychol., vol. 3, no. 2, pp. 77–101, 2006. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.