
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Workflow Integration Alleviates Identity and Access Management in Serverless Computing
Arnav Sankaran, Pubali Datta, Adam Bates
Annual Computer Security Applications Conference (2020), pp. 496-509
Closed Access | Times Cited: 24
Arnav Sankaran, Pubali Datta, Adam Bates
Annual Computer Security Applications Conference (2020), pp. 496-509
Closed Access | Times Cited: 24
Showing 24 citing articles:
Serverless Computing: A Survey of Opportunities, Challenges, and Applications
Hossein Shafiei, Ahmad Khonsari, Payam Mousavi
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-32
Open Access | Times Cited: 142
Hossein Shafiei, Ahmad Khonsari, Payam Mousavi
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-32
Open Access | Times Cited: 142
Survey on serverless computing
Hassan B. Hassan, Saman Barakat, Qusay Idrees Sarhan
Journal of Cloud Computing Advances Systems and Applications (2021) Vol. 10, Iss. 1
Open Access | Times Cited: 118
Hassan B. Hassan, Saman Barakat, Qusay Idrees Sarhan
Journal of Cloud Computing Advances Systems and Applications (2021) Vol. 10, Iss. 1
Open Access | Times Cited: 118
Rise of the Planet of Serverless Computing: A Systematic Review
Jinfeng Wen, Zhenpeng Chen, Xin Jin, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 32, Iss. 5, pp. 1-61
Open Access | Times Cited: 55
Jinfeng Wen, Zhenpeng Chen, Xin Jin, et al.
ACM Transactions on Software Engineering and Methodology (2023) Vol. 32, Iss. 5, pp. 1-61
Open Access | Times Cited: 55
A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends
Mohsen Ghorbian, Mostafa Ghobaei‐Arani, Leila Esmaeili
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5571-5610
Closed Access | Times Cited: 25
Mohsen Ghorbian, Mostafa Ghobaei‐Arani, Leila Esmaeili
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5571-5610
Closed Access | Times Cited: 25
Serverless computing: a security perspective
Eduard Marin, Diego Perino, Roberto Di Pietro
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 41
Eduard Marin, Diego Perino, Roberto Di Pietro
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 41
Serverless Computing: What It Is, and What It Is Not?
Samuel Kounev, Nikolas Herbst, Cristina L. Abad, et al.
Communications of the ACM (2023) Vol. 66, Iss. 9, pp. 80-92
Open Access | Times Cited: 19
Samuel Kounev, Nikolas Herbst, Cristina L. Abad, et al.
Communications of the ACM (2023) Vol. 66, Iss. 9, pp. 80-92
Open Access | Times Cited: 19
Securing Serverless Computing: Challenges, Solutions, and Opportunities
Xing Li, Xue Leng, Yan Chen
IEEE Network (2022) Vol. 37, Iss. 2, pp. 166-173
Open Access | Times Cited: 26
Xing Li, Xue Leng, Yan Chen
IEEE Network (2022) Vol. 37, Iss. 2, pp. 166-173
Open Access | Times Cited: 26
IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations
Chetanpal Singh, Rahul Thakkar, Jatinder Warraich
European Journal of Engineering and Technology Research (2023) Vol. 8, Iss. 4, pp. 30-38
Open Access | Times Cited: 15
Chetanpal Singh, Rahul Thakkar, Jatinder Warraich
European Journal of Engineering and Technology Research (2023) Vol. 8, Iss. 4, pp. 30-38
Open Access | Times Cited: 15
A Comprehensive Survey of Privacy-Enhancing and Trust-Centric Cloud-Native Security Techniques Against Cyber Threats
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
Sensors (2025) Vol. 25, Iss. 8, pp. 2350-2350
Open Access
Tuba Arif, Byunghyun Jo, Jong Hyuk Park
Sensors (2025) Vol. 25, Iss. 8, pp. 2350-2350
Open Access
An Optimal Active Defensive Security Framework for the Container-Based Cloud with Deep Reinforcement Learning
Yuanbo Li, Hongchao Hu, Wenyan Liu, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1598-1598
Open Access | Times Cited: 5
Yuanbo Li, Hongchao Hu, Wenyan Liu, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1598-1598
Open Access | Times Cited: 5
SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing
Hao Liang, Shuai Zhang, Xinlei Liu, et al.
Electronics (2024) Vol. 13, Iss. 16, pp. 3246-3246
Open Access | Times Cited: 1
Hao Liang, Shuai Zhang, Xinlei Liu, et al.
Electronics (2024) Vol. 13, Iss. 16, pp. 3246-3246
Open Access | Times Cited: 1
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies
Isaac Polinsky, Pubali Datta, Adam Bates, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1644-1655
Closed Access | Times Cited: 1
Isaac Polinsky, Pubali Datta, Adam Bates, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 1644-1655
Closed Access | Times Cited: 1
DirectFaaS: A Clean-Slate Network Architecture for Efficient Serverless Chain Communications
Qingyang Zeng, Kaiyu Hou, Xue Leng, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 2759-2767
Closed Access | Times Cited: 1
Qingyang Zeng, Kaiyu Hou, Xue Leng, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 2759-2767
Closed Access | Times Cited: 1
Detection of Compromised Functions in a Serverless Cloud Environment
Danielle Lavi, Oleg Brodt, Dudu Mimran, et al.
(2024)
Closed Access | Times Cited: 1
Danielle Lavi, Oleg Brodt, Dudu Mimran, et al.
(2024)
Closed Access | Times Cited: 1
The Rise of Serverless Architectures: Security Challenges and Best Practices
Burak Cinar
Asian Journal of Research in Computer Science (2023) Vol. 16, Iss. 4, pp. 194-210
Open Access | Times Cited: 3
Burak Cinar
Asian Journal of Research in Computer Science (2023) Vol. 16, Iss. 4, pp. 194-210
Open Access | Times Cited: 3
PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud
Surabhi Garg, Meena Singh Dilip Thakur, M A Rajan, et al.
(2023) Vol. 73, pp. 447-458
Closed Access | Times Cited: 2
Surabhi Garg, Meena Singh Dilip Thakur, M A Rajan, et al.
(2023) Vol. 73, pp. 447-458
Closed Access | Times Cited: 2
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing
Isaac Polinsky, Pubali Datta, Adam Bates, et al.
(2021), pp. 175-186
Open Access | Times Cited: 4
Isaac Polinsky, Pubali Datta, Adam Bates, et al.
(2021), pp. 175-186
Open Access | Times Cited: 4
Smart Healthcare System in Server-Less Environment: Concepts, Architecture, Challenges, Future Directions
Rup Kumar Deka, Akash Ghosh, Sandeep Nanda, et al.
Computers (2024) Vol. 13, Iss. 4, pp. 105-105
Open Access
Rup Kumar Deka, Akash Ghosh, Sandeep Nanda, et al.
Computers (2024) Vol. 13, Iss. 4, pp. 105-105
Open Access
Serverless Computing: A Systematic Literature Review of Challenges and Opportunities
Chunpu Huang, Xin Du, Yukai Huang, et al.
(2024)
Closed Access
Chunpu Huang, Xin Du, Yukai Huang, et al.
(2024)
Closed Access
Securing AWS Lambda: Advanced Strategies and Best Practices
Amine Barrak, Gildas Fofe, Léo Mackowiak, et al.
(2024), pp. 113-119
Closed Access
Amine Barrak, Gildas Fofe, Léo Mackowiak, et al.
(2024), pp. 113-119
Closed Access
MoFaaS: A Moving Target Defense Approach to Fortify Functions as a Service
Pedro Escaleira, Vitor A. Cunha, João Paulo Barraca, et al.
2022 IEEE Symposium on Computers and Communications (ISCC) (2024), pp. 1-7
Closed Access
Pedro Escaleira, Vitor A. Cunha, João Paulo Barraca, et al.
2022 IEEE Symposium on Computers and Communications (ISCC) (2024), pp. 1-7
Closed Access
TrapShield: Enhancing Security and Privacy in Serverless Workflows using Honeypots by Robust Adversary Penalization
Surabhi Garg, Maithri Suresh, Meena Singh Dilip Thakur, et al.
(2024), pp. 245-246
Closed Access
Surabhi Garg, Maithri Suresh, Meena Singh Dilip Thakur, et al.
(2024), pp. 245-246
Closed Access
Detection of compromised functions in a serverless cloud environment
Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, et al.
Computers & Security (2024) Vol. 150, pp. 104261-104261
Closed Access
Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, et al.
Computers & Security (2024) Vol. 150, pp. 104261-104261
Closed Access
Securing Serverless Computing: Challenges, Solutions, and Opportunities
Xing Li, Xue Leng, Yan Chen
arXiv (Cornell University) (2021)
Open Access | Times Cited: 1
Xing Li, Xue Leng, Yan Chen
arXiv (Cornell University) (2021)
Open Access | Times Cited: 1