Microservice security: a systematic literature review
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and comp...
Saved in:
Published in | PeerJ. Computer science Vol. 7; p. e779 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
United States
PeerJ. Ltd
05.01.2022
PeerJ, Inc PeerJ PeerJ Inc |
Subjects | |
Online Access | Get full text |
ISSN | 2376-5992 2376-5992 |
DOI | 10.7717/peerj-cs.779 |
Cover
Loading…
Abstract | Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined
corpus
: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges. |
---|---|
AbstractList | Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined
corpus
: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges. Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined : it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges. Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges. Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges. |
ArticleNumber | e779 |
Audience | Academic |
Author | Montesi, Fabrizio Prandini, Marco Mauro, Jacopo Melis, Andrea Giallorenzo, Saverio Berardi, Davide |
Author_xml | – sequence: 1 givenname: Davide surname: Berardi fullname: Berardi, Davide organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy – sequence: 2 givenname: Saverio surname: Giallorenzo fullname: Giallorenzo, Saverio organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy, INRIA, Sophia Antipolis, France – sequence: 3 givenname: Jacopo surname: Mauro fullname: Mauro, Jacopo organization: Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark – sequence: 4 givenname: Andrea surname: Melis fullname: Melis, Andrea organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy – sequence: 5 givenname: Fabrizio orcidid: 0000-0003-4666-901X surname: Montesi fullname: Montesi, Fabrizio organization: Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark – sequence: 6 givenname: Marco surname: Prandini fullname: Prandini, Marco organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/35111904$$D View this record in MEDLINE/PubMed https://inria.hal.science/hal-03915125$$DView record in HAL |
BookMark | eNptkttv0zAUxiM0xC7sjWdUiRcm0eFLHNs8IFUTsEpFSFyeLcc-6VylcbGdQv_7OesYSzXnwfbx73yxP32nxVHnOyiKVxhdco75-w1AWE1NzDv5rDghlFdTJiU5erQ-Ls5jXCGEMMN5yBfFMR1WEpUnBfvqTPARwtYZmEQwfXBp92GiJ3EXE6x1cmbSugRBpz7AJMDWwZ-XxfNGtxHO7-ez4tfnTz-vrqeLb1_mV7PF1FSYpqkmjFFEGKKAUV1bTAUwKliJrLEVsZxYazHRdWMJrW1JGC6FgEZwxkgpDD0r5ntd6_VKbYJb67BTXjt1V_BhqXTIN2xBIcs5YbUUFjelAaMJYrJGVGOORd00WevjXmvT12uwBroUdDsSHZ907kYt_VaJ7LRANAtc7AVuDtquZws11BCV2WLCtjizb-9_FvzvHmJSaxcNtK3uwPdRkYowUlWID7JvDtCV70OXbc0UrjjnpSD_qaXOj3Vd4_MdzSCqZhyJkkspZKYun6DyZ2HtTI5O43J91HAxashMgr9pqfsY1fzH9zH7-rGBDxb8C1MG3u2BIVExQPOAYKSGuKq7uCoT827QIwe4cSnnzQ_2u_bppltpYevk |
CitedBy_id | crossref_primary_10_1002_smr_2670 crossref_primary_10_1016_j_cities_2022_104071 crossref_primary_10_4236_ojapps_2024_149167 crossref_primary_10_3390_software2030019 crossref_primary_10_1109_ACCESS_2024_3481374 crossref_primary_10_3390_s23010189 crossref_primary_10_3390_s23041755 crossref_primary_10_3390_s25030914 crossref_primary_10_1109_ACCESS_2024_3483659 crossref_primary_10_23939_sisn2024_16_069 crossref_primary_10_3390_app12094424 |
Cites_doi | 10.1002/spe.2931 10.1007/s42979-020-00359-w 10.1007/s11227-014-1251-5 10.1016/j.jss.2020.110710 10.3390/electronics9071172 10.1007/s10586-018-2850-3 10.1109/MS.2019.2947982 10.1007/s40565-018-0425-1 10.1177/001316446002000104 10.1007/s00607-016-0520-y 10.1145/3454122.3456125 10.1186/s13677-019-0141-z 10.1016/j.future.2019.08.020 10.1016/j.cosrev.2020.100308 10.1016/j.promfg.2020.10.153 10.1002/spy2.112 10.1002/smr.2298 10.1016/j.cose.2017.10.006 10.1016/j.promfg.2017.07.197 10.1016/j.future.2019.04.042 10.1007/s10115-018-1248-0 10.1016/S1353-4858(18)30070-9 10.1016/j.jss.2019.110406 10.1016/j.is.2019.06.005 10.1016/j.jss.2020.110720 10.1016/j.adhoc.2020.102153 10.1007/s10619-018-7245-1 10.1016/j.iot.2020.100177 10.1007/978-3-030-58858-8_21 10.1007/s11036-018-1089-9 10.1016/j.future.2018.07.039 10.1002/smr.2263 10.1016/j.jss.2020.110557 10.1016/j.procs.2016.08.278 10.1186/s13174-017-0064-1 10.5383/JUSPN.11.01.003 10.1109/MC.2016.227 10.1109/ACCESS.2020.3044610 10.1016/j.future.2018.05.046 10.1109/ACCESS.2019.2948027 10.3390/s19224905 10.1109/TCCN.2020.2966615 10.1007/s00500-019-04559-2 10.1088/1757-899X/486/1/012109 10.1007/s11036-017-0831-z 10.1016/j.promfg.2020.02.031 10.1016/j.infsof.2017.11.016 10.1016/j.jss.2020.110781 10.1016/j.jss.2020.110564 10.1109/TNET.2018.2890631 10.1002/spe.2513 10.1016/j.jbusres.2019.07.039 10.1016/j.arcontrol.2019.03.005 10.1109/TPDS.2019.2929389 10.1103/PhysRevE.70.066111 10.1007/s10586-017-0897-1 10.1016/j.jss.2020.110798 10.1007/s10664-019-09707-8 10.1016/j.future.2019.07.030 10.1145/3168505 10.1007/978-3-319-62407-5_14 10.1007/978-1-4842-1842-6 10.1007/s00450-016-0337-0 10.1016/j.jss.2018.09.082 10.1002/spy2.18 10.1007/s12083-019-0716-y 10.1016/j.future.2020.03.064 10.1109/ACCESS.2020.3019985 10.1016/j.jisa.2018.11.006 10.1145/3392350.3392351 10.1002/spe.2908 10.1109/COMPSAC.2017.85 10.1145/3277539.3277541 10.1007/978-1-4842-2896-8 10.1007/s10586-020-03150-x 10.1002/cpe.5668 10.1002/cpe.6012 10.1016/j.advengsoft.2019.102734 10.17706/jsw.14.6.257-264 10.1145/3418899 10.1002/smr.1930 10.1145/3356773.3356776 10.1145/3081882 10.1109/ACCESS.2019.2911732 10.1109/SecDev.2019.00027 10.1109/TDSC.2019.2916666 10.1109/TNSM.2018.2889009 10.1088/1742-6596/910/1/012060 10.1016/j.cola.2020.100972 10.14569/IJACSA.2018.090139 10.1007/s12599-016-0447-z 10.1016/j.jnca.2020.102784 10.1016/j.is.2020.101491 10.6028/NIST.SP.800-204 10.1109/MIC.2018.032501519 10.1109/MS.2016.64 10.1145/3378064 10.1007/s10845-019-01516-6 10.1007/s00450-019-00414-9 10.1109/MIC.2019.2956712 10.1007/s10586-018-2874-8 10.1016/j.procs.2019.09.192 10.1016/j.cose.2020.101967 10.1088/1742-6596/1175/1/012101 10.1007/s10664-018-9651-4 10.1007/s13369-018-3140-3 10.3390/s19153292 10.1002/spe.2729 10.3390/fi11060127 10.1145/3396374 10.1007/s10723-019-09498-8 10.1145/3178368.3178371 10.1145/3199665 10.1016/j.sysarc.2019.02.009 10.1007/s10723-018-9453-3 10.1016/j.comcom.2020.03.023 10.1002/cpe.6093 10.1016/j.jbi.2019.103305 10.1002/nem.2132 10.1016/j.procs.2019.09.271 10.1109/ACCESS.2020.2977464 10.1002/9781118988374 10.1016/j.array.2020.100048 10.1002/eng2.12080 10.1016/j.infsof.2019.06.010 10.1007/s00450-019-00413-w 10.1007/978-3-319-57959-7 10.1016/j.promfg.2020.11.055 10.1145/3380322 10.1007/s00607-019-00733-4 10.1109/MCOM.2013.6553677 10.3390/fi9040058 10.1002/cpe.4436 10.1002/9781118181034 10.1145/3301443 10.1002/spe.2761 10.1016/j.ijinfomgt.2019.09.004 10.1016/j.future.2019.06.031 10.1016/j.future.2017.09.020 10.1155/2018/4351603 10.1109/TPDS.2019.2942591 10.1007/s10489-020-02007-5 10.1016/j.iot.2019.100150 10.1109/MCOM.2017.1700089 10.1016/j.entcs.2020.08.007 10.1016/j.compag.2020.105251 10.1007/s00287-019-01178-x 10.1016/j.jmsy.2020.05.017 10.1109/MITP.2018.2876987 10.1007/978-3-319-30070-2 10.1145/3359981 10.7150/ijbs.24617 10.1016/j.jss.2019.01.001 10.47164/ijngc.v7i1.307 10.1007/s11042-019-08166-z 10.1007/s12652-020-02556-0 10.1007/s11042-018-6513-4 10.1016/j.procs.2019.08.061 10.3390/s19214798 10.1016/j.procs.2018.04.047 10.1007/s11761-018-0245-1 10.1007/s11192-009-0146-3 |
ContentType | Journal Article |
Copyright | 2022 Berardi et al. COPYRIGHT 2022 PeerJ. Ltd. 2022 Berardi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. Attribution 2022 Berardi et al. 2022 Berardi et al. |
Copyright_xml | – notice: 2022 Berardi et al. – notice: COPYRIGHT 2022 PeerJ. Ltd. – notice: 2022 Berardi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: Attribution – notice: 2022 Berardi et al. 2022 Berardi et al. |
DBID | AAYXX CITATION NPM ISR 3V. 7XB 8AL 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U 7X8 1XC VOOES 5PM DOA |
DOI | 10.7717/peerj-cs.779 |
DatabaseName | CrossRef PubMed Gale In Context: Science ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest SciTech Premium Collection Technology Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest - Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic MEDLINE - Academic Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) PubMed Central (Full Participant titles) DOAJ |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | CrossRef PubMed MEDLINE - Academic Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2376-5992 |
ExternalDocumentID | oai_doaj_org_article_0d7725b98d1f4ceca2059b03a1718bff PMC8771803 oai_HAL_hal_03915125v1 A708479989 35111904 10_7717_peerj_cs_779 |
Genre | Journal Article |
GeographicLocations | Italy |
GeographicLocations_xml | – name: Italy |
GrantInformation_xml | – fundername: Villum Fonden grantid: 29518 – fundername: Independent Research Fund Denmark grantid: 0135-00219 |
GroupedDBID | 53G 5VS 8FE 8FG AAFWJ AAYXX ABUWG ADBBV AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO FRP GNUQQ GROUPED_DOAJ H13 HCIFZ IAO ICD IEA ISR ITC K6V K7- M~E OK1 P62 PHGZM PHGZT PIMPY PQQKQ PROAC RPM 3V. ARCSS M0N NPM PMFND 7XB 8AL 8FK JQ2 PKEHL PQEST PQGLB PQUKI PRINS Q9U 7X8 1XC PUEGO VOOES 5PM |
ID | FETCH-LOGICAL-c613t-a255302503e10bbd138e538540dcd62d72ddd12abfd23bd4251488ef8755248c3 |
IEDL.DBID | DOA |
ISSN | 2376-5992 |
IngestDate | Wed Aug 27 01:29:23 EDT 2025 Thu Aug 21 13:48:08 EDT 2025 Wed Aug 27 07:40:56 EDT 2025 Thu Jul 10 18:25:10 EDT 2025 Fri Jul 25 09:20:49 EDT 2025 Tue Jun 17 20:53:31 EDT 2025 Tue Jun 10 20:21:36 EDT 2025 Fri Jun 27 03:48:30 EDT 2025 Thu Jan 02 22:56:26 EST 2025 Tue Jul 01 02:28:40 EDT 2025 Thu Apr 24 22:57:29 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Authentication and authorization Privacy Service deployment Software development Authentication Intrusion detection and prevention Threat model Service composition Service discovery Infrastructure-as-a-service |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 2022 Berardi et al. Attribution: http://creativecommons.org/licenses/by This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c613t-a255302503e10bbd138e538540dcd62d72ddd12abfd23bd4251488ef8755248c3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0003-4666-901X 0000-0002-3658-6395 |
OpenAccessLink | https://doaj.org/article/0d7725b98d1f4ceca2059b03a1718bff |
PMID | 35111904 |
PQID | 2616777482 |
PQPubID | 2045934 |
PageCount | e779 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_0d7725b98d1f4ceca2059b03a1718bff pubmedcentral_primary_oai_pubmedcentral_nih_gov_8771803 hal_primary_oai_HAL_hal_03915125v1 proquest_miscellaneous_2625266073 proquest_journals_2616777482 gale_infotracmisc_A708479989 gale_infotracacademiconefile_A708479989 gale_incontextgauss_ISR_A708479989 pubmed_primary_35111904 crossref_primary_10_7717_peerj_cs_779 crossref_citationtrail_10_7717_peerj_cs_779 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-01-05 |
PublicationDateYYYYMMDD | 2022-01-05 |
PublicationDate_xml | – month: 01 year: 2022 text: 2022-01-05 day: 05 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States – name: San Diego – name: San Diego, USA |
PublicationTitle | PeerJ. Computer science |
PublicationTitleAlternate | PeerJ Comput Sci |
PublicationYear | 2022 |
Publisher | PeerJ. Ltd PeerJ, Inc PeerJ PeerJ Inc |
Publisher_xml | – name: PeerJ. Ltd – name: PeerJ, Inc – name: PeerJ – name: PeerJ Inc |
References | Andersen (10.7717/peerj-cs.779/ref-15) 2017 Du (10.7717/peerj-cs.779/ref-90) 2018 Gorige (10.7717/peerj-cs.779/ref-107) 2020 Puliafito (10.7717/peerj-cs.779/ref-220) 2019; 19 Hendrickson (10.7717/peerj-cs.779/ref-118) 2016 Badii (10.7717/peerj-cs.779/ref-21) 2019; 19 Demoulin (10.7717/peerj-cs.779/ref-78) 2018 Pustchi (10.7717/peerj-cs.779/ref-221) 2015 Chen (10.7717/peerj-cs.779/ref-56) 2019 Yang (10.7717/peerj-cs.779/ref-302) 2014; 70 Kelbert (10.7717/peerj-cs.779/ref-142) 2017 Wen (10.7717/peerj-cs.779/ref-293) 2019; 31 Mann (10.7717/peerj-cs.779/ref-173) 2020; 110 Wang (10.7717/peerj-cs.779/ref-290) 2020 Mohammed (10.7717/peerj-cs.779/ref-181) 2020 Kohnfelder (10.7717/peerj-cs.779/ref-145) 1999 Kathiravelu (10.7717/peerj-cs.779/ref-140) 2019; 22 Yarygina (10.7717/peerj-cs.779/ref-304) 2018 Ciavotta (10.7717/peerj-cs.779/ref-60) 2017; 11 Trihinas (10.7717/peerj-cs.779/ref-272) 2018; 22 Ahmed (10.7717/peerj-cs.779/ref-7) 2019; 7 Di Sanzo (10.7717/peerj-cs.779/ref-85) 2021; 51 Salibindla (10.7717/peerj-cs.779/ref-236) 2018; 7 Thanh (10.7717/peerj-cs.779/ref-264) 2016 Abidi (10.7717/peerj-cs.779/ref-1) 2019; 159 Reyna (10.7717/peerj-cs.779/ref-230) 2018; 88 Soldani (10.7717/peerj-cs.779/ref-247) 2018; 146 Zimmermann (10.7717/peerj-cs.779/ref-315) 2017a; 99 De Donno (10.7717/peerj-cs.779/ref-72) 2019; 11 Fetzer (10.7717/peerj-cs.779/ref-96) 2017 Díaz-Sánchez (10.7717/peerj-cs.779/ref-70) 2019; 19 Tenev (10.7717/peerj-cs.779/ref-263) 2020 Truong (10.7717/peerj-cs.779/ref-276) 2020; 9 Adedugbe (10.7717/peerj-cs.779/ref-3) 2019; 24 Ponce (10.7717/peerj-cs.779/ref-216) 2021 Stallenberg (10.7717/peerj-cs.779/ref-249) 2019 Adam (10.7717/peerj-cs.779/ref-2) 2020; 9 Jander (10.7717/peerj-cs.779/ref-125) 2018; 130 Javed (10.7717/peerj-cs.779/ref-128) 2020; 18 Pahl (10.7717/peerj-cs.779/ref-205) 2018 Stewart (10.7717/peerj-cs.779/ref-250) 2012 Kamble (10.7717/peerj-cs.779/ref-136) 2016 Sundelin (10.7717/peerj-cs.779/ref-255) 2020 Mohsin (10.7717/peerj-cs.779/ref-182) 2018; 12 Yu (10.7717/peerj-cs.779/ref-308) 2019; 31 Bandeira (10.7717/peerj-cs.779/ref-25) 2019 Hahn (10.7717/peerj-cs.779/ref-110) 2020 Yarygina (10.7717/peerj-cs.779/ref-305) 2018 Casale (10.7717/peerj-cs.779/ref-47) 2019; 35 Baboi (10.7717/peerj-cs.779/ref-20) 2019; 159 Zdun (10.7717/peerj-cs.779/ref-311) 2019; 37 Mansfield-Devine (10.7717/peerj-cs.779/ref-174) 2018; 2018 Melis (10.7717/peerj-cs.779/ref-178) 2018; 23 Paschke (10.7717/peerj-cs.779/ref-211) 2016; 58 Zimmermann (10.7717/peerj-cs.779/ref-316) 2017b; 32 Krishnan (10.7717/peerj-cs.779/ref-147) 2019; 50 Diekmann (10.7717/peerj-cs.779/ref-86) 2018; 16 Lwakatare (10.7717/peerj-cs.779/ref-169) 2019; 114 Ibrahim (10.7717/peerj-cs.779/ref-121) 2019 ShuLin (10.7717/peerj-cs.779/ref-242) 2020 Leite (10.7717/peerj-cs.779/ref-153) 2020 Di Salle (10.7717/peerj-cs.779/ref-84) 2016 Krämer (10.7717/peerj-cs.779/ref-146) 2019; 99 Chondamrongkul (10.7717/peerj-cs.779/ref-59) 2020 Preuveneers (10.7717/peerj-cs.779/ref-218) 2017; 9 Pahl (10.7717/peerj-cs.779/ref-206) 2018 Jan (10.7717/peerj-cs.779/ref-124) 2019; 24 Oppermann (10.7717/peerj-cs.779/ref-200) 2018; 1 Ravichandran (10.7717/peerj-cs.779/ref-225) 2016 Niknejad (10.7717/peerj-cs.779/ref-193) 2020; 91 Kumar (10.7717/peerj-cs.779/ref-148) 2020; 97 Camilli (10.7717/peerj-cs.779/ref-46) 2017 Wuyts (10.7717/peerj-cs.779/ref-298) 2018 Leite (10.7717/peerj-cs.779/ref-152) 2017; 20 Zhiyi (10.7717/peerj-cs.779/ref-314) 2018; 6 Sultan (10.7717/peerj-cs.779/ref-253) 2019; 7 Bozan (10.7717/peerj-cs.779/ref-35) 2020; 64 Jita (10.7717/peerj-cs.779/ref-132) 2018 Torkura (10.7717/peerj-cs.779/ref-267) 2018 de Toledo (10.7717/peerj-cs.779/ref-75) 2020 Zuo (10.7717/peerj-cs.779/ref-317) 2020; 6 Montesi (10.7717/peerj-cs.779/ref-183) 2018 Paladi (10.7717/peerj-cs.779/ref-208) 2018 Noura (10.7717/peerj-cs.779/ref-198) 2019; 24 Alshuqayran (10.7717/peerj-cs.779/ref-12) 2016 Hajek (10.7717/peerj-cs.779/ref-111) 2020 Trnka (10.7717/peerj-cs.779/ref-273) 2018; 2018 Andersen (10.7717/peerj-cs.779/ref-16) 2018; 14 Russinovich (10.7717/peerj-cs.779/ref-233) 2021; 19 Walker (10.7717/peerj-cs.779/ref-288) 2020; 20 Casale (10.7717/peerj-cs.779/ref-48) 2016; 97 Bertolino (10.7717/peerj-cs.779/ref-30) 2020 Perrone (10.7717/peerj-cs.779/ref-213) 2017 Ahmadvand (10.7717/peerj-cs.779/ref-6) 2018 Zhang (10.7717/peerj-cs.779/ref-312) 2020 DesLauriers (10.7717/peerj-cs.779/ref-79) 2020; 33 Luntovskyy (10.7717/peerj-cs.779/ref-167) 2020 Casalicchio (10.7717/peerj-cs.779/ref-49) 2020; 32 Cheruvu (10.7717/peerj-cs.779/ref-57) 2020 Clauset (10.7717/peerj-cs.779/ref-62) 2004; 70 Dragoni (10.7717/peerj-cs.779/ref-88) 2017 Dash (10.7717/peerj-cs.779/ref-69) 2020; 3 Manu (10.7717/peerj-cs.779/ref-175) 2016 Varghese (10.7717/peerj-cs.779/ref-283) 2018; 79 Haque (10.7717/peerj-cs.779/ref-115) 2020 Wang (10.7717/peerj-cs.779/ref-291) 2018 Xu (10.7717/peerj-cs.779/ref-301) 2019 de Sousa (10.7717/peerj-cs.779/ref-74) 2020 Hole (10.7717/peerj-cs.779/ref-119) 2016 Janjua (10.7717/peerj-cs.779/ref-127) 2020; 9 Balalaie (10.7717/peerj-cs.779/ref-23) 2016; 33 Kochovski (10.7717/peerj-cs.779/ref-144) 2019; 101 Liang (10.7717/peerj-cs.779/ref-160) 2020 Preuveneers (10.7717/peerj-cs.779/ref-219) 2019 Brito (10.7717/peerj-cs.779/ref-38) 2019; 8 Sim (10.7717/peerj-cs.779/ref-244) 2019; 1175 Sharma (10.7717/peerj-cs.779/ref-241) 2020 Fahmideh (10.7717/peerj-cs.779/ref-94) 2020; 87 Basso (10.7717/peerj-cs.779/ref-26) 2017 Baker (10.7717/peerj-cs.779/ref-22) 2019 Khan (10.7717/peerj-cs.779/ref-143) 2020; 32 Osman (10.7717/peerj-cs.779/ref-201) 2019 Wohlin (10.7717/peerj-cs.779/ref-296) 2014 Garriga (10.7717/peerj-cs.779/ref-101) 2017 Lu (10.7717/peerj-cs.779/ref-166) 2021; 51 Yuan (10.7717/peerj-cs.779/ref-309) 2019; 486 Westerlund (10.7717/peerj-cs.779/ref-294) 2018 Zhang (10.7717/peerj-cs.779/ref-313) 2017 Hasan (10.7717/peerj-cs.779/ref-116) 2020; 56 Zaheer (10.7717/peerj-cs.779/ref-310) 2019 Dewanta (10.7717/peerj-cs.779/ref-80) 2020 Beekman (10.7717/peerj-cs.779/ref-27) 2017 Nehme (10.7717/peerj-cs.779/ref-189) 2018 Brenner (10.7717/peerj-cs.779/ref-37) 2017 Di Francesco (10.7717/peerj-cs.779/ref-82) 2019; 150 Salomoni (10.7717/peerj-cs.779/ref-237) 2018; 16 Guija (10.7717/peerj-cs.779/ref-108) 2018 Taherizadeh (10.7717/peerj-cs.779/ref-261) 2020; 140 Brambilla (10.7717/peerj-cs.779/ref-36) 2017; 8 Soldani (10.7717/peerj-cs.779/ref-246) 2019; 44 Nagendra (10.7717/peerj-cs.779/ref-187) 2019 Osman (10.7717/peerj-cs.779/ref-202) 2019 Ali (10.7717/peerj-cs.779/ref-10) 2020; 53 Bhattacharya (10.7717/peerj-cs.779/ref-31) 2019 Hannousse (10.7717/peerj-cs.779/ref-114) 2020 Nikoloudakis (10.7717/peerj-cs.779/ref-195) 2019; 12 Souppaya (10.7717/peerj-cs.779/ref-248) 2017 Kalske (10.7717/peerj-cs.779/ref-135) 2017 Anisetti (10.7717/peerj-cs.779/ref-17) 2019 Shahin (10.7717/peerj-cs.779/ref-240) 2019; 24 Bumblauskas (10.7717/peerj-cs.779/ref-42) 2020; 52 Ranawaka (10.7717/peerj-cs.779/ref-222) 2020 Hsu (10.7717/peerj-cs.779/ref-120) 2018 Trihinas (10.7717/peerj-cs.779/ref-271) 2016 Tuma (10.7717/peerj-cs.779/ref-277) 2020 Lou (10.7717/peerj-cs.779/ref-164) 2020; 51 Garg (10.7717/peerj-cs.779/ref-100) 2019 Moura (10.7717/peerj-cs.779/ref-186) 2020; 169 Walsh (10.7717/peerj-cs.779/ref-289) 2017 Morris (10.7717/peerj-cs.779/ref-185) 2017; 2017 Moreira (10.7717/peerj-cs.779/ref-184) 2020; 30 Bánáti (10.7717/peerj-cs.779/ref-24) 2018 Ranjbar (10.7717/peerj-cs.779/ref-223) 2017 Van Eck (10.7717/peerj-cs.779/ref-281) 2010; 84 Redelinghuys (10.7717/peerj-cs.779/ref-228) 2019; 31 Mishra (10.7717/peerj-cs.779/ref-179) 2020; 38 Rao (10.7717/peerj-cs.779/ref-224) 2018; 60 Brucker (10.7717/peerj-cs.779/ref-41) 2017; 47 Cerny (10.7717/peerj-cs.779/ref-52) 2020; 8 Syed (10.7717/peerj-cs.779/ref-259) 2018 Nikouei (10.7717/peerj-cs.779/ref-196) 2019 Lenarduzzi (10.7717/peerj-cs.779/ref-155) 2020; 169 Cerny (10.7717/peerj-cs.779/ref-50) 2016 Liu (10.7717/peerj-cs.779/ref-163) 2020 George (10.7717/peerj-cs.779/ref-102) 2017; 1 Chandramouli (10.7717/peerj-cs.779/ref-53) 2019; 800 Bogatinovski (10.7717/peerj-cs.779/ref-33) 2020 Bromberg (10.7717/peerj-cs.779/ref-39) 2020 Clancy (10.7717/peerj-cs.779/ref-61) 2019 Vale (10.7717/peerj-cs.779/ref-280) 2019 Otterstad (10.7717/peerj-cs.779/ref-203) 2017 Vaquero (10.7717/peerj-cs.779/ref-282) 2019; 90 Di Francesco (10.7717/peerj-cs.779/ref-83) 2017 Kang (10.7717/peerj-cs.779/ref-138) 2018 Esposito (10.7717/peerj-cs.779/ref-93) 2017; 55 Prandi (10.7717/peerj-cs.779/ref-217) 2019; 78 Taha (10.7717/peerj-cs.779/ref-260) 2019; 155 Akkermans (10.7717/peerj-cs.779/ref-8) 2018 Luo (10.7717/peerj-cs.779/ref-168) 2018 Lakhan (10.7717/peerj-cs.779/ref-150) 2020; 102 Roca (10.7717/peerj-cs.779/ref-231) 2020; 102 Almeida (10.7717/peerj-cs.779/ref-11) 2017 Yang (10.7717/peerj-cs.779/ref-303) 2018; 14 Beheshti (10.7717/peerj-cs.779/ref-28) 2019; 37 da Silva (10.7717/peerj-cs.779/ref-67) 2019 Jander (10.7717/peerj-cs.779/ref-126) 2019; 11 Buzachis (10.7717/peerj-cs.779/ref-43) 2018 Kapferer (10.7717/peerj-cs.779/ref-139) 2020 Xu (10.7717/peerj-cs.779/ref-300) 2019; 19 Torkura (10.7717/peerj-cs.779/ref-269) 2017 Petrovska (10.7717/peerj-cs.779/ref-214) 2019 Baarzi (10.7717/peerj-cs.779/ref-19) 2020 Li (10.7717/peerj-cs.779/ref-158) 2019a Wieber (10.7717/peerj-cs.779/ref-295) 2020 Jaworski (10.7717/peerj-cs.779/ref-129) 2019 Di Ciccio (10.7717/peerj-cs.779/ref-81) 2019; 42 Panduman (10.7717/peerj-cs.779/ref-209) 2019 Ghayyur (10.7717/peerj-cs.779/ref-104) 2018; 9 Kang (10.7717/peerj-cs.779/ref-137) 2019 Costa (10.7717/peerj-cs.779/ref-66) 2020; 169 Pahl (10.7717/peerj-cs.779/ref-207) 2018 Łaskawiec (10.7717/peerj-cs.779/ref-151) 2019; 22 Pentikousis (10.7717/peerj-cs.779/ref-212) 2013; 51 Tourani (10.7717/peerj-cs.779/ref-270) 2019 Agarwal (10.7717/peerj-cs.779/ref-4) 2019; 27 Waseem (10.7717/peerj-cs.779/ref-292) 2020; 170 Nkomo (10.7717/peerj-cs.779/ref-197) 2019 Voigt (10.7717/peerj-cs.779/ref-286) 2017 Islam (10.7717/peerj-cs.779/ref-123) 2016; 7 Dilshan (10.7717/peerj-cs.779/ref-87) 2020 Callegati (10.7717/peerj-cs.779/ref-44) 2016 Surantha (10.7717/peerj-cs.779/ref-257) 2019 Bélair (10.7717/peerj-cs.779/ref-29) 2019 Joseph (10.7717/peerj-cs.779/ref-133) 2019; 49 Kallergis (10.7717/peerj-cs.779/ref-134) 2020; 104 Alulema (10.7717/p |
References_xml | – year: 2016 ident: 10.7717/peerj-cs.779/ref-118 article-title: Serverless computation with openlambda – volume: 51 start-page: 1059 issue: 5 year: 2021 ident: 10.7717/peerj-cs.779/ref-166 article-title: Integrated model-driven engineering of blockchain applications for business processes and asset management publication-title: Software: Practice and Experience doi: 10.1002/spe.2931 – year: 2016 ident: 10.7717/peerj-cs.779/ref-271 article-title: Designing scalable and secure microservices by embracing devops-as-a-service offerings – volume: 1 start-page: 1 issue: 6 year: 2020 ident: 10.7717/peerj-cs.779/ref-227 article-title: A systematic review on software architectures for iot systems and future direction to the adoption of microservices architecture publication-title: SN Computer Science doi: 10.1007/s42979-020-00359-w – start-page: 932 year: 2018 ident: 10.7717/peerj-cs.779/ref-267 article-title: A cyber risk based moving target defense mechanism for microservice architectures – volume: 70 start-page: 408 issue: 1 year: 2014 ident: 10.7717/peerj-cs.779/ref-302 article-title: Cloud computing in e-science: research challenges and opportunities publication-title: The Journal of Supercomputing doi: 10.1007/s11227-014-1251-5 – start-page: 45 year: 2018 ident: 10.7717/peerj-cs.779/ref-132 article-title: A framework to apply the internet of things for medical care in a home environment – volume: 169 start-page: 110710 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-155 article-title: Does migrating a monolithic system to microservices decrease the technical debt? publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110710 – start-page: 425 year: 2020 ident: 10.7717/peerj-cs.779/ref-80 article-title: Secure microservices deployment for fog computing services in a remote office – volume: 9 start-page: 1172 issue: 7 year: 2020 ident: 10.7717/peerj-cs.779/ref-127 article-title: Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies publication-title: Electronics doi: 10.3390/electronics9071172 – volume: 22 start-page: 829 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-151 article-title: New solutions for exposing clustered applications deployed in the cloud publication-title: Cluster Computing doi: 10.1007/s10586-018-2850-3 – year: 2020 ident: 10.7717/peerj-cs.779/ref-114 article-title: Securing microservices and microservice architectures: a systematic mapping study – volume: 37 start-page: 87 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-311 article-title: Emerging trends, challenges, and experiences in devops and microservice Apis publication-title: IEEE Software doi: 10.1109/MS.2019.2947982 – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-188 article-title: A microservice-enabled architecture for smart surveillance using blockchain technology – start-page: 47 year: 2017 ident: 10.7717/peerj-cs.779/ref-313 article-title: Towards effective virtualization of intrusion detection systems – start-page: 72 year: 2018 ident: 10.7717/peerj-cs.779/ref-205 article-title: All eyes on you: distributed multi-dimensional iot microservice anomaly detection – start-page: 467 year: 2019 ident: 10.7717/peerj-cs.779/ref-100 article-title: Automated cloud infrastructure, continuous integration and continuous delivery using docker with robust container security – volume: 6 start-page: 900 issue: 5 year: 2018 ident: 10.7717/peerj-cs.779/ref-314 article-title: Cyber-secure decentralized energy management for iot-enabled active distribution networks publication-title: Journal of Modern Power Systems and Clean Energy doi: 10.1007/s40565-018-0425-1 – start-page: 389 year: 2019 ident: 10.7717/peerj-cs.779/ref-56 article-title: Informer: irregular traffic detection for containerized microservices rpc in the real world – volume: 20 start-page: 37 issue: 1 year: 1960 ident: 10.7717/peerj-cs.779/ref-64 article-title: A coefficient of agreement for nominal scales publication-title: Educational and Psychological Measurement doi: 10.1177/001316446002000104 – start-page: 48 year: 2020 ident: 10.7717/peerj-cs.779/ref-163 article-title: Unsupervised detection of microservice trace anomalies through service-level deep Bayesian networks – volume: 99 start-page: 129 issue: 2 year: 2017a ident: 10.7717/peerj-cs.779/ref-315 article-title: Architectural refactoring for the cloud: a decision-centric view on cloud migration publication-title: Computing doi: 10.1007/s00607-016-0520-y – start-page: 1 year: 2016 ident: 10.7717/peerj-cs.779/ref-44 article-title: Data security issues in maas-enabling platforms – volume: 19 start-page: 49 issue: 1 year: 2021 ident: 10.7717/peerj-cs.779/ref-233 article-title: Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use publication-title: Queue doi: 10.1145/3454122.3456125 – volume: 8 start-page: 1 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-38 article-title: Secure end-to-end processing of smart metering data publication-title: Journal of Cloud Computing doi: 10.1186/s13677-019-0141-z – volume: 102 start-page: 775 issue: 9 year: 2020 ident: 10.7717/peerj-cs.779/ref-99 article-title: Secure cloud-edge deployments, with trust publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.08.020 – volume: 38 start-page: 100308 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-179 article-title: Devops and software quality: a systematic mapping publication-title: Computer Science Review doi: 10.1016/j.cosrev.2020.100308 – volume: 51 start-page: 1091 year: 2020 ident: 10.7717/peerj-cs.779/ref-194 article-title: A microservice architecture for predictive analytics in manufacturing publication-title: Procedia Manufacturing doi: 10.1016/j.promfg.2020.10.153 – volume: 3 start-page: e112 issue: 5 year: 2020 ident: 10.7717/peerj-cs.779/ref-69 article-title: Model based iot security framework using multiclass adaptive boosting with smote publication-title: Security and Privacy doi: 10.1002/spy2.112 – start-page: e2298 year: 2020 ident: 10.7717/peerj-cs.779/ref-30 article-title: Devopret: continuous reliability testing in devops publication-title: Journal of Software: Evolution and Process doi: 10.1002/smr.2298 – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-67 article-title: Squad: a secure, simple storage service for SGX-based microservices – start-page: 332 year: 2020 ident: 10.7717/peerj-cs.779/ref-277 article-title: Automating the early detection of security design flaws – volume: 74 start-page: 277 issue: 7 year: 2018 ident: 10.7717/peerj-cs.779/ref-45 article-title: Cloud-of-things meets mobility-as-a-service: an insider threat perspective publication-title: Computers & Security doi: 10.1016/j.cose.2017.10.006 – start-page: 11 year: 2018 ident: 10.7717/peerj-cs.779/ref-305 article-title: Overcoming security challenges in microservice architectures – volume: 11 start-page: 931 year: 2017 ident: 10.7717/peerj-cs.779/ref-60 article-title: A microservice-based middleware for the digital factory publication-title: Procedia Manufacturing doi: 10.1016/j.promfg.2017.07.197 – volume: 99 start-page: 308 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-146 article-title: Implementing secure applications in smart city clouds using microservices publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.04.042 – start-page: 342 year: 2020 ident: 10.7717/peerj-cs.779/ref-33 article-title: Self-supervised anomaly detection from distributed traces – start-page: 255 year: 2019 ident: 10.7717/peerj-cs.779/ref-25 article-title: We need to talk about microservices: an analysis from the discussions on stackoverflow – start-page: 122 year: 2020 ident: 10.7717/peerj-cs.779/ref-74 article-title: Building a prototype based on microservices and blockchain technologies for notary’s office: an academic experience report – start-page: 195 year: 2020 ident: 10.7717/peerj-cs.779/ref-75 article-title: Improving agility by managing shared libraries in microservices – volume: 60 start-page: 1 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-224 article-title: The big data system, components, tools, and technologies: a survey publication-title: Knowledge and Information Systems doi: 10.1007/s10115-018-1248-0 – start-page: 49 year: 2019 ident: 10.7717/peerj-cs.779/ref-310 article-title: eztrust: network-independent zero-trust perimeterization for microservices – start-page: 140 year: 2020 ident: 10.7717/peerj-cs.779/ref-110 article-title: Mismesh: Security issues and challenges in service meshes – volume: 2018 start-page: 15 issue: 7 year: 2018 ident: 10.7717/peerj-cs.779/ref-174 article-title: Devops: finding room for security publication-title: Network Security doi: 10.1016/S1353-4858(18)30070-9 – volume: 158 start-page: 110406 issue: 10 year: 2019 ident: 10.7717/peerj-cs.779/ref-232 article-title: Deeplink: recovering issue-commit links based on deep learning publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2019.110406 – volume: 87 start-page: 101409 issue: 10 year: 2020 ident: 10.7717/peerj-cs.779/ref-94 article-title: An exploration of iot platform development publication-title: Information Systems doi: 10.1016/j.is.2019.06.005 – volume: 169 start-page: 110720 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-66 article-title: Towards the adoption of omg standards in the development of soa-based iot systems publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110720 – volume: 104 start-page: 102153 issue: Pt. 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-134 article-title: Capodaz: a containerised authorisation and policy-driven architecture using microservices publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2020.102153 – start-page: 187 year: 2019 ident: 10.7717/peerj-cs.779/ref-34 article-title: Microservices in industry: insights into technologies, characteristics, and software quality – start-page: 17 year: 2018 ident: 10.7717/peerj-cs.779/ref-156 article-title: VNIDS: towards elastic security with safe and efficient virtualization of network intrusion detection systems – volume: 37 start-page: 351 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-28 article-title: Datasynapse: a social data curation foundry publication-title: Distributed and Parallel Databases doi: 10.1007/s10619-018-7245-1 – start-page: 79 year: 2020 ident: 10.7717/peerj-cs.779/ref-59 article-title: Automated security analysis for microservice architecture – start-page: 560 year: 2018 ident: 10.7717/peerj-cs.779/ref-90 article-title: Anomaly detection and diagnosis for container-based microservices with performance monitoring – volume: 9 start-page: 100177 year: 2020 ident: 10.7717/peerj-cs.779/ref-2 article-title: The fog cloud of things: a survey on concepts, architecture, standards, tools, and applications publication-title: Iternet of Thing doi: 10.1016/j.iot.2020.100177 – start-page: 1 year: 2014 ident: 10.7717/peerj-cs.779/ref-296 article-title: Guidelines for snowballing in systematic literature studies and a replication in software engineering – start-page: 203 volume-title: Agile Processes in Software Engineering and Extreme Programming – Workshops year: 2020 ident: 10.7717/peerj-cs.779/ref-65 article-title: Certification as a service doi: 10.1007/978-3-030-58858-8_21 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-312 article-title: Fenghuolun: a federated learning based edge computing platform for cyber-physical systems – volume: 24 start-page: 796 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-198 article-title: Interoperability in internet of things: taxonomies and open challenges publication-title: Mobile Networks and Applications doi: 10.1007/s11036-018-1089-9 – volume: 90 start-page: 20 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-282 article-title: Research challenges in nextgen service orchestration publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.07.039 – volume: 32 start-page: e2263 issue: 10 year: 2020 ident: 10.7717/peerj-cs.779/ref-143 article-title: Multicriteria decision-making taxonomy for devops challenging factors using analytical hierarchy process publication-title: Journal of Software: Evolution and Process doi: 10.1002/smr.2263 – volume: 164 start-page: 110557 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-226 article-title: Arc: anomaly-aware robust cloud-integrated iot service composition based on uncertainty in advertised quality of service values publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110557 – volume: 97 start-page: 34 year: 2016 ident: 10.7717/peerj-cs.779/ref-48 article-title: Current and future challenges of software engineering for services and applications publication-title: Procedia Computer Science doi: 10.1016/j.procs.2016.08.278 – year: 2019 ident: 10.7717/peerj-cs.779/ref-22 article-title: A novel approach to secure microservice architecture from owasp vulnerabilities – volume: 8 start-page: 14 issue: 1 year: 2017 ident: 10.7717/peerj-cs.779/ref-36 article-title: Model-driven development of user interfaces for IoT systems via domain-specific components and patterns publication-title: Journal of Internet Services and Applications doi: 10.1186/s13174-017-0064-1 – volume: 11 start-page: 17 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-126 article-title: Practical defense-in-depth solution for microservice systems publication-title: Journal of Ubiquitous Systems & Pervasive Networks doi: 10.5383/JUSPN.11.01.003 – start-page: 655 year: 2018 ident: 10.7717/peerj-cs.779/ref-294 article-title: Towards distributed clouds: a review about the evolution of centralized cloud computing, distributed ledger technologies, and a foresight on unifying opportunities and security implications – volume: 49 start-page: 62 issue: 8 year: 2016 ident: 10.7717/peerj-cs.779/ref-170 article-title: Vendor malware: detection limits and mitigation publication-title: Computer doi: 10.1109/MC.2016.227 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-115 article-title: Challenges in docker development: a large-scale study using stack overflow – volume: 8 start-page: 226397 year: 2020 ident: 10.7717/peerj-cs.779/ref-131 article-title: An anomaly detection algorithm for microservice architecture based on robust principal component analysis publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3044610 – start-page: 49 year: 2017 ident: 10.7717/peerj-cs.779/ref-203 article-title: Low-level exploitation mitigation by diverse microservices – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-160 article-title: On the design of a blockchain-based student quality assessment system – volume: 88 start-page: 173 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-230 article-title: On blockchain and its integration with iot. challenges and opportunities publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.05.046 – volume: 7 start-page: 155472 year: 2019 ident: 10.7717/peerj-cs.779/ref-7 article-title: Service management for IoT: requirements, taxonomy, recent advances and open research challenges publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2948027 – volume: 19 start-page: 4905 issue: 22 year: 2019 ident: 10.7717/peerj-cs.779/ref-300 article-title: Microservice security agent based on api gateway in edge computing publication-title: Sensors doi: 10.3390/s19224905 – volume: 6 start-page: 548 issue: 2 year: 2020 ident: 10.7717/peerj-cs.779/ref-317 article-title: An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis publication-title: IEEE Transactions on Cognitive Communications and Networking doi: 10.1109/TCCN.2020.2966615 – start-page: 203 year: 2017 ident: 10.7717/peerj-cs.779/ref-101 article-title: Towards a taxonomy of microservices architectures – start-page: 24 year: 2020 ident: 10.7717/peerj-cs.779/ref-122 article-title: Immunizer: a scalable loosely-coupled self-protecting software framework using adaptive microagents and parallelized microservices – volume: 24 start-page: 5999 year: 2019 ident: 10.7717/peerj-cs.779/ref-3 article-title: Leveraging cloud computing for the semantic web: review and trends publication-title: Soft Computing doi: 10.1007/s00500-019-04559-2 – start-page: 39 year: 2020 ident: 10.7717/peerj-cs.779/ref-241 article-title: Towards trustworthy and independent data marketplaces – volume: 486 start-page: 012109 year: 2019 ident: 10.7717/peerj-cs.779/ref-309 article-title: Research on power trading platform based on big data and artificial intelligence technology publication-title: IOP Conference Series: Materials Science and Engineering doi: 10.1088/1757-899X/486/1/012109 – volume: 23 start-page: 167 issue: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-178 article-title: Integrating personalized and accessible itineraries in maas ecosystems through microservices publication-title: Mobile Networks and Applications doi: 10.1007/s11036-017-0831-z – start-page: 38 year: 2016 ident: 10.7717/peerj-cs.779/ref-243 article-title: Bring your own identity-case study from the swiss government – volume: 42 start-page: 111 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-251 article-title: Middleware-based cyber-physical production system modeling for operators publication-title: Procedia Manufacturing doi: 10.1016/j.promfg.2020.02.031 – volume: 95 start-page: 329 issue: 10 year: 2018 ident: 10.7717/peerj-cs.779/ref-275 article-title: Exploiting load testing and profiling for performance antipattern detection publication-title: Information and Software Technology doi: 10.1016/j.infsof.2017.11.016 – start-page: 1 year: 2017 ident: 10.7717/peerj-cs.779/ref-96 article-title: Integrating reactive cloud applications in sereca – volume: 170 start-page: 110781 issue: 2 year: 2020 ident: 10.7717/peerj-cs.779/ref-106 article-title: Continuous experimentation and the cyber-physical systems challenge: an overview of the literature and the industrial perspective publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110781 – start-page: 169 year: 2018 ident: 10.7717/peerj-cs.779/ref-306 article-title: A game of microservices: automated intrusion response – volume: 165 start-page: 110564 issue: 9 year: 2020 ident: 10.7717/peerj-cs.779/ref-18 article-title: Scalability assessment of microservice architecture deployment configurations: a domain-based approach leveraging operational profiles and load tests publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110564 – volume: 27 start-page: 433 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-4 article-title: VNF placement and resource allocation for the support of vertical services in 5g networks publication-title: IEEE/ACM Transactions on Networking doi: 10.1109/TNET.2018.2890631 – start-page: 142 year: 2020 ident: 10.7717/peerj-cs.779/ref-290 article-title: Root-cause metric location for microservice systems via log anomaly detection – volume: 47 start-page: 1923 issue: 12 year: 2017 ident: 10.7717/peerj-cs.779/ref-41 article-title: Modelling, validating, and ranking of secure service compositions publication-title: Software: Practice and Experience doi: 10.1002/spe.2513 – volume: 104 start-page: 333 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-245 article-title: Literature review as a research methodology: an overview and guidelines publication-title: Journal of Business Research doi: 10.1016/j.jbusres.2019.07.039 – start-page: 398 year: 2020 ident: 10.7717/peerj-cs.779/ref-157 article-title: Exploring the challenges of developing and operating consortium blockchains: a case study – start-page: 278 year: 2020 ident: 10.7717/peerj-cs.779/ref-32 article-title: A toolbox for realtime timeseries anomaly detection – volume: 47 start-page: 237 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-265 article-title: Cpus-IoT: a cyber-physical microservice and iot-based framework for manufacturing assembly systems publication-title: Annual Reviews in Control doi: 10.1016/j.arcontrol.2019.03.005 – volume: 31 start-page: 129 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-293 article-title: Ga-par: dependable microservice orchestration framework for geo-distributed clouds publication-title: IEEE Transactions on Parallel and Distributed Systems doi: 10.1109/TPDS.2019.2929389 – start-page: 12 year: 2018 ident: 10.7717/peerj-cs.779/ref-176 article-title: μ NDN: an orchestrated microservice architecture for named data networking – start-page: 224 year: 2020 ident: 10.7717/peerj-cs.779/ref-235 article-title: Information system development for restricting access to software tool built on microservice architecture – start-page: 131 year: 2020 ident: 10.7717/peerj-cs.779/ref-97 article-title: Improving the security of microservice systems by detecting and tolerating intrusions – volume: 70 start-page: 066111 issue: 6 year: 2004 ident: 10.7717/peerj-cs.779/ref-62 article-title: Finding community structure in very large networks publication-title: Physical Review E doi: 10.1103/PhysRevE.70.066111 – start-page: 90 year: 2017 ident: 10.7717/peerj-cs.779/ref-269 article-title: Leveraging cloud native design patterns for security-as-a-service applications – volume: 20 start-page: 1951 issue: 3 year: 2017 ident: 10.7717/peerj-cs.779/ref-152 article-title: Dohko: an autonomic system for provision, configuration, and management of inter-cloud environments based on a software product line engineering method publication-title: Cluster Computing doi: 10.1007/s10586-017-0897-1 – volume: 170 start-page: 110798 issue: 12 year: 2020 ident: 10.7717/peerj-cs.779/ref-292 article-title: A systematic mapping study on microservices architecture in devops publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2020.110798 – start-page: 504 year: 2020 ident: 10.7717/peerj-cs.779/ref-141 article-title: Towards evolving security requirements of industrial internet: a layered security architecture solution based on data transfer techniques – volume: 24 start-page: 3696 issue: 6 year: 2019 ident: 10.7717/peerj-cs.779/ref-124 article-title: Search-based multi-vulnerability testing of xml injections in web applications publication-title: Empirical Software Engineering doi: 10.1007/s10664-019-09707-8 – volume: 101 start-page: 747 issue: 4 year: 2019 ident: 10.7717/peerj-cs.779/ref-144 article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.07.030 – volume: 61 start-page: 58 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-239 article-title: Monitoring in a devops world publication-title: Communications of the ACM doi: 10.1145/3168505 – start-page: 203 volume-title: Computational Science and Its Applications – ICCSA 2017 year: 2017 ident: 10.7717/peerj-cs.779/ref-287 article-title: A systematic literature review on microservices doi: 10.1007/978-3-319-62407-5_14 – start-page: 467 year: 2018 ident: 10.7717/peerj-cs.779/ref-138 article-title: Distributed monitoring system for microservices-based iot middleware system – volume-title: DevOps for digital leaders year: 2016 ident: 10.7717/peerj-cs.779/ref-225 doi: 10.1007/978-1-4842-1842-6 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-87 article-title: Mschain: blockchain based decentralized certificate transparency for microservices – start-page: 246 year: 2020 ident: 10.7717/peerj-cs.779/ref-171 article-title: Automap: diagnose your microservice-based web applications automatically – volume-title: The threats to our products year: 1999 ident: 10.7717/peerj-cs.779/ref-145 – volume: 32 start-page: 301 issue: 3–4 year: 2017b ident: 10.7717/peerj-cs.779/ref-316 article-title: Microservices tenets publication-title: Computer Science-Research and Development doi: 10.1007/s00450-016-0337-0 – volume: 146 start-page: 215 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-247 article-title: The pains and gains of microservices: a systematic grey literature review publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2018.09.082 – volume: 1 start-page: e18 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-200 article-title: Secure cloud computing: Reference architecture for measuring instrument under legal control publication-title: Security and Privacy doi: 10.1002/spy2.18 – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-280 article-title: Security mechanisms used in microservices-based systems: a systematic mapping – start-page: 282 year: 2017 ident: 10.7717/peerj-cs.779/ref-142 article-title: Securecloud: secure big data processing in untrusted clouds – volume: 12 start-page: 1216 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-195 article-title: Vulnerability assessment as a service for fog-centric ICT ecosystems: a healthcare use case publication-title: Peer-to-Peer Networking and Applications doi: 10.1007/s12083-019-0716-y – volume-title: DevOps: continuous delivery, integration, and deployment with DevOps: dive into the core DevOps strategies year: 2018 ident: 10.7717/peerj-cs.779/ref-279 – volume: 110 start-page: 243 issue: 8 year: 2020 ident: 10.7717/peerj-cs.779/ref-173 article-title: Secure software placement and configuration publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2020.03.064 – start-page: 390 year: 2020 ident: 10.7717/peerj-cs.779/ref-111 article-title: The necessity of interdisciplinary software development for building viable research platforms: case study in automated drug delivery in diabetes – start-page: 358 year: 2019 ident: 10.7717/peerj-cs.779/ref-270 article-title: Towards security-as-a-service in multi-access edge – start-page: 250 year: 2020 ident: 10.7717/peerj-cs.779/ref-107 article-title: Privacy-risk detection in microservices composition using distributed tracing – start-page: 1090 year: 2019 ident: 10.7717/peerj-cs.779/ref-249 article-title: Jcomix: a search-based tool to detect xml injection vulnerabilities in web applications – volume-title: Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps year: 2018 ident: 10.7717/peerj-cs.779/ref-120 – year: 2016 ident: 10.7717/peerj-cs.779/ref-136 – start-page: 59 year: 2018 ident: 10.7717/peerj-cs.779/ref-8 article-title: Polyglot cerberos: resource security, interoperability and multi-tenancy for IoT services on a multilingual platform – volume: 8 start-page: 159449 year: 2020 ident: 10.7717/peerj-cs.779/ref-52 article-title: On code analysis opportunities and challenges for enterprise systems and microservices publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3019985 – start-page: 1 year: 2017 ident: 10.7717/peerj-cs.779/ref-258 article-title: The container manager pattern – volume: 44 start-page: 32 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-91 article-title: Offering security diagnosis as a service for cloud saas applications publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2018.11.006 – start-page: 59 year: 2017 ident: 10.7717/peerj-cs.779/ref-289 article-title: Mechanisms for mutual attested microservice communication – volume: 20 start-page: 5 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-288 article-title: On cloud computing infrastructure for existing code-clone detection algorithms publication-title: ACM SIGAPP Applied Computing Review doi: 10.1145/3392350.3392351 – volume: 51 start-page: 46 issue: 1 year: 2021 ident: 10.7717/peerj-cs.779/ref-85 article-title: Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies publication-title: Software: Practice and Experience doi: 10.1002/spe.2908 – start-page: 57 year: 2018 ident: 10.7717/peerj-cs.779/ref-168 article-title: High performance userspace networking for containerized microservices – start-page: 238 year: 2019 ident: 10.7717/peerj-cs.779/ref-209 article-title: A survey of IoT platform comparison for building cyber-physical system architecture – year: 2017 ident: 10.7717/peerj-cs.779/ref-248 article-title: Application container security guide (2nd draft) – year: 2020 ident: 10.7717/peerj-cs.779/ref-204 article-title: Open web application security project (OWASP) application threat modeling – volume: 1 start-page: 649 volume-title: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) year: 2017 ident: 10.7717/peerj-cs.779/ref-102 article-title: Claimsware: a claims-based middleware for securing iot services doi: 10.1109/COMPSAC.2017.85 – start-page: 187 year: 2017 ident: 10.7717/peerj-cs.779/ref-46 article-title: A formal framework for specifying and verifying microservices based process flows – start-page: 262 year: 2019 ident: 10.7717/peerj-cs.779/ref-274 article-title: Big data platform for integrated cyber and physical security of critical infrastructures for the financial sector: critical infrastructures as cyber-physical systems – volume: 16 start-page: 44 issue: 4 year: 2018 ident: 10.7717/peerj-cs.779/ref-92 article-title: Tracking and controlling microservice dependencies publication-title: Queue doi: 10.1145/3277539.3277541 – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-201 article-title: Sandnet: towards high quality of deception in container-based microservice architectures – start-page: 285 year: 2019 ident: 10.7717/peerj-cs.779/ref-61 article-title: Post-quantum cryptography and 5g security: tutorial – start-page: 255 year: 2019 ident: 10.7717/peerj-cs.779/ref-129 article-title: Microservice-based cloud application ported to unikernels: performance comparison of different technologies – volume-title: Demystifying internet of things security: successful iot device/edge and platform security deployment year: 2020 ident: 10.7717/peerj-cs.779/ref-57 doi: 10.1007/978-1-4842-2896-8 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-181 article-title: Security architectures for sensitive data in cloud computing – volume: 23 start-page: 1937 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-13 article-title: A model-driven engineering approach for the service integration of iot systems publication-title: Cluster Computing doi: 10.1007/s10586-020-03150-x – volume: 32 start-page: e5668 issue: 17 year: 2020 ident: 10.7717/peerj-cs.779/ref-49 article-title: The state-of-the-art in container technologies: application, orchestration and security publication-title: Concurrency and Computation: Practice and Experience doi: 10.1002/cpe.5668 – volume: 33 start-page: e6012 issue: 23 year: 2020 ident: 10.7717/peerj-cs.779/ref-149 article-title: Protocol fuzzing to find security vulnerabilities of rabbitMQ publication-title: Concurrency and Computation: Practice and Experience doi: 10.1002/cpe.6012 – start-page: 1 year: 2016 ident: 10.7717/peerj-cs.779/ref-175 article-title: Docker container security via heuristics-based multilateral security-conceptual and pragmatic study – volume: 140 start-page: 102734 issue: 9 year: 2020 ident: 10.7717/peerj-cs.779/ref-261 article-title: Key influencing factors of the kubernetes auto-scaler for computing-intensive microservice-native cloud-based applications publication-title: Advances in Engineering Software doi: 10.1016/j.advengsoft.2019.102734 – volume: 14 start-page: 257 issue: 6 year: 2019 ident: 10.7717/peerj-cs.779/ref-191 article-title: Applying spring security framework and oauth2 to protect microservice architecture API publication-title: Journal of Software doi: 10.17706/jsw.14.6.257-264 – volume: 17 start-page: 1 issue: 4 year: 2020 ident: 10.7717/peerj-cs.779/ref-40 article-title: A black-box monitoring approach to measure microservices runtime performance publication-title: ACM Transactions on Architecture and Code Optimization (TACO) doi: 10.1145/3418899 – volume: 30 start-page: e1930 issue: 7 year: 2018 ident: 10.7717/peerj-cs.779/ref-215 article-title: Software architectures for health care cyber-physical systems: a systematic literature review publication-title: Journal of Software: Evolution and Process doi: 10.1002/smr.1930 – volume-title: CISSP: certified information systems security professional study guide year: 2012 ident: 10.7717/peerj-cs.779/ref-250 – volume: 44 start-page: 11 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-246 article-title: Grey literature: a safe bridge between academy and industry? publication-title: ACM SIGSOFT Software Engineering Notes doi: 10.1145/3356773.3356776 – start-page: 189 year: 2020 ident: 10.7717/peerj-cs.779/ref-139 article-title: Domain-driven service design – start-page: 348 year: 2019 ident: 10.7717/peerj-cs.779/ref-257 article-title: Secure kubernetes networking design based on zero trust model: A case study of financial service enterprise in indonesia – volume: 2017 start-page: 1 issue: May year: 2017 ident: 10.7717/peerj-cs.779/ref-185 article-title: 10 rules for an unhackable data vault publication-title: Ubiquity doi: 10.1145/3081882 – volume: 7 start-page: 52976 year: 2019 ident: 10.7717/peerj-cs.779/ref-253 article-title: Container security: issues, challenges, and the road ahead publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2911732 – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-206 article-title: Securing IoT microservices with certificates – start-page: 144 volume-title: 2019 IEEE Cybersecurity Development (SecDev) year: 2019 ident: 10.7717/peerj-cs.779/ref-54 article-title: With great abstraction comes great responsibility: Sealing the microservices attack surface doi: 10.1109/SecDev.2019.00027 – start-page: 1 year: 2017 ident: 10.7717/peerj-cs.779/ref-213 article-title: The docker security playground: a hands-on approach to the study of network security – start-page: 177 year: 2017 ident: 10.7717/peerj-cs.779/ref-37 article-title: Secure cloud micro services using Intel SGX – volume: 18 start-page: 1125 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-130 article-title: Dseom: a framework for dynamic security evaluation and optimization of mtd in container-based cloud publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2019.2916666 – start-page: 1158 year: 2020 ident: 10.7717/peerj-cs.779/ref-295 article-title: Automated generation of client-specific backends utilizing existing microservices and architectural knowledge – volume: 16 start-page: 41 issue: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-86 article-title: Agile network access control in the container age publication-title: IEEE Transactions on Network and Service Management doi: 10.1109/TNSM.2018.2889009 – volume: 910 start-page: 012060 year: 2017 ident: 10.7717/peerj-cs.779/ref-117 article-title: Authentication and authorization of end user in microservice architecture publication-title: Journal of Physics: Conference Series doi: 10.1088/1742-6596/910/1/012060 – volume: 59 start-page: 100972 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-180 article-title: Applications of model-driven engineering in cyber-physical systems: a systematic mapping study publication-title: Journal of Computer Languages doi: 10.1016/j.cola.2020.100972 – volume: 9 start-page: 284 issue: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-104 article-title: Matrix clustering based migration of system application to microservices architecture publication-title: International Journal of Advanced Computer Science and Applications doi: 10.14569/IJACSA.2018.090139 – start-page: 32 year: 2017 ident: 10.7717/peerj-cs.779/ref-135 article-title: Challenges when moving from monolith to microservice architecture – volume: 58 start-page: 329 issue: 5 year: 2016 ident: 10.7717/peerj-cs.779/ref-211 article-title: Provalets: component-based mobile agents as microservices for rule-based data access, processing and analytics publication-title: Business & Information Systems Engineering doi: 10.1007/s12599-016-0447-z – start-page: 1733 volume-title: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018 year: 2018 ident: 10.7717/peerj-cs.779/ref-183 article-title: From the decorator pattern to circuit breakers in microservices – start-page: 31 year: 2019 ident: 10.7717/peerj-cs.779/ref-31 article-title: Smart proxying for microservices – volume: 169 start-page: 102784 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-186 article-title: Fog computing systems: state of the art, research issues and future trends, with a focus on resilience publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2020.102784 – start-page: 436 year: 2016 ident: 10.7717/peerj-cs.779/ref-84 article-title: Composition of advanced (μ) services for the next generation of the internet of things – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-29 article-title: Leveraging kernel security mechanisms to improve container security: a survey – start-page: 38 year: 2020 ident: 10.7717/peerj-cs.779/ref-210 article-title: Secure volume hot-plugging for containers (industry track) – volume: 91 start-page: 101491 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-193 article-title: Understanding service-oriented architecture (SOA): a systematic literature review and directions for further investigation publication-title: Information Systems doi: 10.1016/j.is.2020.101491 – start-page: 564 year: 2019 ident: 10.7717/peerj-cs.779/ref-301 article-title: Blendmas: a blockchain-enabled decentralized microservices architecture for smart public safety – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-112 article-title: Toward scaling hardware security module for emerging cloud services – volume: 800 start-page: 204 year: 2019 ident: 10.7717/peerj-cs.779/ref-53 article-title: Microservices-based application systems publication-title: NIST Special Publication doi: 10.6028/NIST.SP.800-204 – start-page: 29 year: 2019 ident: 10.7717/peerj-cs.779/ref-219 article-title: Towards multi-party policy-based access control in federations of cloud and edge microservices – volume: 22 start-page: 65 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-272 article-title: Devops as a service: pushing the boundaries of microservice adoption publication-title: IEEE Internet Computing doi: 10.1109/MIC.2018.032501519 – volume: 33 start-page: 42 issue: 3 year: 2016 ident: 10.7717/peerj-cs.779/ref-23 article-title: Microservices architecture enables devops: migration to a cloud-native architecture publication-title: IEEE Software doi: 10.1109/MS.2016.64 – volume: 64 start-page: 79 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-35 article-title: How to transition incrementally to microservice architecture publication-title: Communications of the ACM doi: 10.1145/3378064 – volume: 31 start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-228 article-title: A six-layer architecture for the digital twin: a manufacturing case study implementation publication-title: Journal of Intelligent Manufacturing doi: 10.1007/s10845-019-01516-6 – volume: 35 start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-161 article-title: Requirements for a model-driven cloud-native migration of monolithic web-based applications publication-title: SICS Software-Intensive Cyber-Physical Systems doi: 10.1007/s00450-019-00414-9 – volume: 24 start-page: 25 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-297 article-title: State of the art and research challenges in the security technologies of network function virtualization publication-title: IEEE Internet Computing doi: 10.1109/MIC.2019.2956712 – start-page: 47 year: 2018 ident: 10.7717/peerj-cs.779/ref-43 article-title: Basic principles of osmotic computing: secure and dependable microelements (mels) orchestration leveraging blockchain facilities – start-page: 67 year: 2020 ident: 10.7717/peerj-cs.779/ref-255 article-title: The hidden cost of backward compatibility: when deprecation turns into technical debt-an experience report – start-page: 60 year: 2020 ident: 10.7717/peerj-cs.779/ref-98 article-title: Using attack injection to evaluate intrusion detection effectiveness in container-based systems – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-73 article-title: A method for architectural trade-off analysis based on patterns: evaluating microservices structural attributes – volume: 22 start-page: 661 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-140 article-title: SD-CPS: software-defined cyber-physical systems. taming the challenges of CPS with workflows at the edge publication-title: Cluster Computing doi: 10.1007/s10586-018-2874-8 – volume: 159 start-page: 372 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-1 article-title: A web service security governance approach based on dedicated micro-services publication-title: Procedia Computer Science doi: 10.1016/j.procs.2019.09.192 – volume: 97 start-page: 101967 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-148 article-title: Modeling continuous security: a conceptual model for automated devsecops using open-source software over cloud (adoc) publication-title: Computers & Security doi: 10.1016/j.cose.2020.101967 – start-page: 205 year: 2019 ident: 10.7717/peerj-cs.779/ref-17 article-title: A continuous certification methodology for devops – volume: 7 start-page: 277 issue: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-236 article-title: Microservices API security publication-title: International Journal of Engineering Research & Technology doi: 10.1088/1742-6596/1175/1/012101 – volume: 24 start-page: 1061 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-240 article-title: An empirical study of architecting for continuous delivery and deployment publication-title: Empirical Software Engineering doi: 10.1007/s10664-018-9651-4 – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-252 article-title: Interface quality patterns: Communicating and improving the quality of microservices Apis – start-page: 44 year: 2016 ident: 10.7717/peerj-cs.779/ref-12 article-title: A systematic mapping study in microservice architecture – volume: 43 start-page: 7719 issue: 12 year: 2018 ident: 10.7717/peerj-cs.779/ref-192 article-title: What do software practitioners really think about software process improvement project success? An exploratory study publication-title: Arabian Journal for Science and Engineering doi: 10.1007/s13369-018-3140-3 – volume: 19 start-page: 3292 issue: 15 year: 2019 ident: 10.7717/peerj-cs.779/ref-70 article-title: DNS/DANE collision-based distributed and dynamic authentication for microservices in IoT publication-title: Sensors doi: 10.3390/s19153292 – start-page: 467 year: 2020 ident: 10.7717/peerj-cs.779/ref-89 article-title: Catalyzer: sub-millisecond startup for serverless computing with initialization-less booting – year: 2021 ident: 10.7717/peerj-cs.779/ref-216 article-title: Smells and refactorings for microservices security: a multivocal literature review publication-title: ArXiv – start-page: 646 year: 2020 ident: 10.7717/peerj-cs.779/ref-105 article-title: Multilayer technique to secure data transfer in private cloud for saas applications – start-page: 68 year: 2016 ident: 10.7717/peerj-cs.779/ref-5 article-title: Requirements reconciliation for scalable and secure microservice (de) composition – volume: 49 start-page: 1448 issue: 10 year: 2019 ident: 10.7717/peerj-cs.779/ref-133 article-title: Straddling the crevasse: a review of microservice software architecture foundations and recent advancements publication-title: Software: Practice and Experience doi: 10.1002/spe.2729 – volume: 11 start-page: 127 issue: 6 year: 2019 ident: 10.7717/peerj-cs.779/ref-72 article-title: Cyber-storms come from clouds: security of cloud computing in the iot era publication-title: Future Internet doi: 10.3390/fi11060127 – start-page: 1235 year: 2019 ident: 10.7717/peerj-cs.779/ref-121 article-title: Attack graph generation for microservice architecture – volume: 53 start-page: 1 issue: 4 year: 2020 ident: 10.7717/peerj-cs.779/ref-10 article-title: Foundations, properties, and security applications of puzzles: a survey publication-title: ACM Computing Surveys (CSUR) doi: 10.1145/3396374 – start-page: 1175 year: 2018 ident: 10.7717/peerj-cs.779/ref-298 article-title: Effective and efficient privacy threat modeling through domain refinements – volume: 18 start-page: 1 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-128 article-title: Iotef: a federated edge-cloud architecture for fault-tolerant iot applications publication-title: Journal of Grid Computing doi: 10.1007/s10723-019-09498-8 – volume: 15 start-page: 35 issue: 6 year: 2017 ident: 10.7717/peerj-cs.779/ref-238 article-title: Monitoring in a devops world publication-title: Queue doi: 10.1145/3178368.3178371 – volume: 14 start-page: 1 issue: 3–4 year: 2018 ident: 10.7717/peerj-cs.779/ref-16 article-title: Democratizing authority in the built environment publication-title: ACM Transactions on Sensor Networks (TOSN) doi: 10.1145/3199665 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-68 article-title: A microservices architecture for ads-b data security using blockchain – volume: 98 start-page: 289 issue: 2011 year: 2019 ident: 10.7717/peerj-cs.779/ref-307 article-title: All one needs to know about fog computing and related edge computing paradigms: a complete survey publication-title: Journal of Systems Architecture doi: 10.1016/j.sysarc.2019.02.009 – volume: 16 start-page: 381 issue: 3 year: 2018 ident: 10.7717/peerj-cs.779/ref-237 article-title: Indigo-datacloud: a platform to facilitate seamless access to e-infrastructures publication-title: Journal of Grid Computing doi: 10.1007/s10723-018-9453-3 – volume: 155 start-page: 252 issue: 5 year: 2020 ident: 10.7717/peerj-cs.779/ref-9 article-title: Secure multi-cloud virtual network embedding publication-title: Computer Communications doi: 10.1016/j.comcom.2020.03.023 – volume: 33 start-page: e6093 issue: 19 year: 2020 ident: 10.7717/peerj-cs.779/ref-79 article-title: Cloud apps to-go: cloud portability with TOSCA and MiCADO publication-title: Concurrency and Computation: Practice and Experience doi: 10.1002/cpe.6093 – volume: 2 start-page: 123 year: 2019 ident: 10.7717/peerj-cs.779/ref-177 article-title: Identifying availability tactics to support security architectural design of microservice-based systems – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-207 article-title: Graph-based iot microservice security – start-page: 573 year: 2018 ident: 10.7717/peerj-cs.779/ref-6 article-title: Integrity protection against insiders in microservice-based infrastructures: from threats to a security framework – start-page: 712 year: 2018 ident: 10.7717/peerj-cs.779/ref-78 article-title: Dedos: defusing dos with dispersion oriented software – volume: 102 start-page: 103305 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-231 article-title: Microservice chatbot architecture for chronic patient support publication-title: Journal of Biomedical Informatics doi: 10.1016/j.jbi.2019.103305 – start-page: 302 year: 2018 ident: 10.7717/peerj-cs.779/ref-51 article-title: On isolation-driven automated module decomposition – volume: 30 start-page: e2132 issue: 6 year: 2020 ident: 10.7717/peerj-cs.779/ref-184 article-title: Next generation of microservices for the 5g service-based architecture publication-title: International Journal of Network Management doi: 10.1002/nem.2132 – start-page: 171 year: 2017 ident: 10.7717/peerj-cs.779/ref-268 article-title: Integrating continuous security assessments in microservices and cloud native applications – start-page: 21 year: 2017 ident: 10.7717/peerj-cs.779/ref-83 article-title: Research on architecting microservices: trends, focus, and potential for industrial adoption – volume: 159 start-page: 1035 issue: 3–4 year: 2019 ident: 10.7717/peerj-cs.779/ref-20 article-title: Dynamic microservices to create scalable and fault tolerance architecture publication-title: Procedia Computer Science doi: 10.1016/j.procs.2019.09.271 – volume: 8 start-page: 43413 year: 2020 ident: 10.7717/peerj-cs.779/ref-55 article-title: A framework of virtual war room and matrix sketch-based streaming anomaly detection for microservice systems publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2977464 – start-page: 278 year: 2020 ident: 10.7717/peerj-cs.779/ref-222 article-title: Custos: security middleware for science gateways – volume-title: Risk centric threat modeling year: 2015 ident: 10.7717/peerj-cs.779/ref-278 doi: 10.1002/9781118988374 – start-page: 1 year: 2017 ident: 10.7717/peerj-cs.779/ref-27 article-title: Challenges for scaling applications across enclaves – volume-title: Information security handbook: develop a threat model and incident response strategy to build a strong information security framework year: 2017 ident: 10.7717/peerj-cs.779/ref-76 – volume: 8 start-page: 100048 issue: August year: 2020 ident: 10.7717/peerj-cs.779/ref-71 article-title: Security challenges to smart agriculture: current state, key issues, and future directions publication-title: Array doi: 10.1016/j.array.2020.100048 – start-page: 63 year: 2015 ident: 10.7717/peerj-cs.779/ref-221 article-title: Authorization federation in iaas multi cloud – volume: 1 start-page: e12080 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-266 article-title: Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches publication-title: Engineering Reports doi: 10.1002/eng2.12080 – volume: 114 start-page: 217 issue: 8 year: 2019 ident: 10.7717/peerj-cs.779/ref-169 article-title: Devops in practice: a multiple case study of five companies publication-title: Information and Software Technology doi: 10.1016/j.infsof.2019.06.010 – start-page: 505 year: 2020 ident: 10.7717/peerj-cs.779/ref-153 article-title: Platform teams: an organizational structure for continuous delivery – volume: 35 start-page: 77 year: 2019 ident: 10.7717/peerj-cs.779/ref-47 article-title: Radon: rational decomposition and orchestration for serverless computing publication-title: SICS Software-Intensive Cyber-Physical Systems doi: 10.1007/s00450-019-00413-w – volume-title: The eu general data protection regulation (gdpr): a practical guide year: 2017 ident: 10.7717/peerj-cs.779/ref-286 doi: 10.1007/978-3-319-57959-7 – start-page: 1169 year: 2020 ident: 10.7717/peerj-cs.779/ref-242 article-title: Research on unified authentication and authorization in microservice architecture – start-page: 195 volume-title: Microservices: yesterday, today, and tomorrow year: 2017 ident: 10.7717/peerj-cs.779/ref-88 – volume: 52 start-page: 331 issue: 5 year: 2020 ident: 10.7717/peerj-cs.779/ref-95 article-title: Design of virtual engineering and digital twin platform as implementation of cyber-physical systems publication-title: Procedia Manufacturing doi: 10.1016/j.promfg.2020.11.055 – start-page: 101 year: 2019 ident: 10.7717/peerj-cs.779/ref-196 article-title: I-safe: instant suspicious activity identification at the edge using fuzzy decision making – year: 2018 ident: 10.7717/peerj-cs.779/ref-304 article-title: Exploring microservice security – start-page: 492 year: 2018 ident: 10.7717/peerj-cs.779/ref-291 article-title: Cloudranger: root cause identification for cloud native systems – start-page: 427 year: 2019 ident: 10.7717/peerj-cs.779/ref-137 article-title: Protected coordination of service mesh for container-based 3-tier service traffic – volume: 63 start-page: 58 issue: 5 year: 2020 ident: 10.7717/peerj-cs.779/ref-229 article-title: Beyond the ‘fix-it’ treadmill publication-title: Communications of the ACM doi: 10.1145/3380322 – start-page: 21 year: 2019 ident: 10.7717/peerj-cs.779/ref-202 article-title: Seconetbench: a modular framework for secure container networking benchmarks – start-page: 122 year: 2019a ident: 10.7717/peerj-cs.779/ref-158 article-title: Service mesh: challenges, state of the art, and future research opportunities – volume: 102 start-page: 105 issue: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-150 article-title: Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks publication-title: Computing doi: 10.1007/s00607-019-00733-4 – volume: 51 start-page: 44 issue: 7 year: 2013 ident: 10.7717/peerj-cs.779/ref-212 article-title: Mobileflow: toward software-defined mobile networks publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2013.6553677 – volume: 9 start-page: 58 issue: 4 year: 2017 ident: 10.7717/peerj-cs.779/ref-218 article-title: Access control with delegated authorization policy evaluation for data-driven microservice workflows publication-title: Future Internet doi: 10.3390/fi9040058 – start-page: 31 year: 2019 ident: 10.7717/peerj-cs.779/ref-256 article-title: Can container fusion be securely achieved? – volume: 31 start-page: e4436 issue: 22 year: 2019 ident: 10.7717/peerj-cs.779/ref-308 article-title: A survey on security issues in services communication of microservices-enabled fog applications publication-title: Concurrency and Computation: Practice and Experience doi: 10.1002/cpe.4436 – start-page: 1 year: 2015 ident: 10.7717/peerj-cs.779/ref-262 article-title: Swiss tso integrated operational planning, optimization and ancillary services system – start-page: 1108 year: 2017 ident: 10.7717/peerj-cs.779/ref-26 article-title: Privaaas: privacy approach for a distributed cloud-based data analytics platforms – start-page: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-214 article-title: Soa approach-identity and access management for the risk management platform – start-page: 181 year: 2020 ident: 10.7717/peerj-cs.779/ref-63 article-title: Tapis api development with python: best practices in scientific rest api implementation: experience implementing a distributed stream api – year: 2012 ident: 10.7717/peerj-cs.779/ref-234 publication-title: Case Study Research in Software Engineering-Guidelines and Examples doi: 10.1002/9781118181034 – volume: 19 start-page: 1 issue: 2 year: 2019 ident: 10.7717/peerj-cs.779/ref-220 article-title: Fog computing for the internet of things: a survey publication-title: ACM Transactions on Internet Technology doi: 10.1145/3301443 – start-page: 23:1 volume-title: Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, BuildSys 2017 year: 2017 ident: 10.7717/peerj-cs.779/ref-15 article-title: Old democratizing authority in the built environment – start-page: 423 year: 2019 ident: 10.7717/peerj-cs.779/ref-197 article-title: Development activities, tools and techniques of secure microservices compositions – volume: 50 start-page: 757 issue: 5 year: 2019 ident: 10.7717/peerj-cs.779/ref-147 article-title: SDN/NFV security framework for fog-to-things computing infrastructure publication-title: Software: Practice and Experience doi: 10.1002/spe.2761 – volume: 52 start-page: 102008 issue: 9 year: 2020 ident: 10.7717/peerj-cs.779/ref-42 article-title: A blockchain use case in food distribution: do you know where your food has been? publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2019.09.004 – start-page: 31 year: 2020 ident: 10.7717/peerj-cs.779/ref-19 article-title: Microservices made attack-resilient using unsupervised service fissioning – year: 2020 ident: 10.7717/peerj-cs.779/ref-77 article-title: Smart cyber-physical systems: toward pervasive intelligence systems doi: 10.1016/j.future.2019.06.031 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-162 article-title: Devops in an iso 13485 regulated environment: a multivocal literature review – start-page: 61 year: 2019 ident: 10.7717/peerj-cs.779/ref-103 article-title: Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures – volume: 79 start-page: 849 issue: 6 year: 2018 ident: 10.7717/peerj-cs.779/ref-283 article-title: Next generation cloud computing: new trends and research directions publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2017.09.020 – volume: 2018 start-page: 1 issue: 7 year: 2018 ident: 10.7717/peerj-cs.779/ref-273 article-title: Survey of authentication and authorization for the internet of things publication-title: Security and Communication Networks doi: 10.1155/2018/4351603 – start-page: 148 year: 2020 ident: 10.7717/peerj-cs.779/ref-39 article-title: Droidautoml: a microservice architecture to automate the evaluation of android machine learning detection systems – start-page: 1180 year: 2018 ident: 10.7717/peerj-cs.779/ref-24 article-title: Authentication and authorization orchestrator for microservice-based software architectures – volume: 31 start-page: 695 issue: 3 year: 2019b ident: 10.7717/peerj-cs.779/ref-159 article-title: Exploring new opportunities to defeat low-rate ddos attack in container-based cloud environment publication-title: IEEE Transactions on Parallel and Distributed Systems doi: 10.1109/TPDS.2019.2942591 – volume: 51 start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-164 article-title: Cyber intrusion detection through association rule mining on multi-source logs publication-title: Applied Intelligence doi: 10.1007/s10489-020-02007-5 – volume: 9 start-page: 100150 issue: 3 year: 2020 ident: 10.7717/peerj-cs.779/ref-276 article-title: Devops contract for assuring execution of iot microservices in the edge publication-title: Internet of Things doi: 10.1016/j.iot.2019.100150 – start-page: 199 year: 2017 ident: 10.7717/peerj-cs.779/ref-11 article-title: Survey on microservice architecture-security, privacy and standardization on cloud computing environment – volume: 55 start-page: 102 issue: 9 year: 2017 ident: 10.7717/peerj-cs.779/ref-93 article-title: Security and privacy for cloud-based data management in the health network service chain: a microservice approach publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1700089 – volume: 351 start-page: 115 year: 2020 ident: 10.7717/peerj-cs.779/ref-14 article-title: Correct audit logging in concurrent systems publication-title: Electronic Notes in Theoretical Computer Science doi: 10.1016/j.entcs.2020.08.007 – volume: 170 start-page: 105251 issue: 1–3 year: 2020 ident: 10.7717/peerj-cs.779/ref-113 article-title: A secure fish farm platform based on blockchain for agriculture data integrity publication-title: Computers and Electronics in Agriculture doi: 10.1016/j.compag.2020.105251 – start-page: 31 year: 2016 ident: 10.7717/peerj-cs.779/ref-264 article-title: Embedding security and privacy into the development and operation of cloud applications and services – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.779/ref-263 article-title: Recommendations for enhancing security in microservice environment altered in an intelligent way – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-108 article-title: Identity and access control for micro-services based 5g nfv platforms – volume: 42 start-page: 182 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-81 article-title: Blockchain support for collaborative business processes publication-title: Informatik Spektrum doi: 10.1007/s00287-019-01178-x – volume: 56 start-page: 157 issue: 2 year: 2020 ident: 10.7717/peerj-cs.779/ref-116 article-title: Decentralized cloud manufacturing-as-a-service (cmaas) platform architecture with configurable digital assets publication-title: Journal of Manufacturing Systems doi: 10.1016/j.jmsy.2020.05.017 – volume: 21 start-page: 42 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-190 article-title: Securing microservices publication-title: IT Professional doi: 10.1109/MITP.2018.2876987 – start-page: 285 year: 2018 ident: 10.7717/peerj-cs.779/ref-189 article-title: Fine-grained access control for microservices – start-page: 13 year: 2020 ident: 10.7717/peerj-cs.779/ref-299 article-title: A cloud robotic application platform design based on the microservices architecture – volume-title: Anti-fragile ICT systems year: 2016 ident: 10.7717/peerj-cs.779/ref-119 doi: 10.1007/978-3-319-30070-2 – volume-title: Securing DevOps: security in the cloud year: 2018 ident: 10.7717/peerj-cs.779/ref-285 – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-259 article-title: A reference architecture for the container ecosystem – volume: 52 start-page: 1 issue: 6 year: 2019 ident: 10.7717/peerj-cs.779/ref-154 article-title: A survey of devops concepts and challenges publication-title: ACM Computing Surveys (CSUR) doi: 10.1145/3359981 – volume: 14 start-page: 907 issue: 8 year: 2018 ident: 10.7717/peerj-cs.779/ref-303 article-title: Microshare: privacy-preserved medical resource sharing through microservice architecture publication-title: International Journal of Biological Sciences doi: 10.7150/ijbs.24617 – volume: 150 start-page: 77 issue: 1 year: 2019 ident: 10.7717/peerj-cs.779/ref-82 article-title: Architecting with microservices: a systematic mapping study publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2019.01.001 – volume: 7 start-page: 307 issue: 1 year: 2016 ident: 10.7717/peerj-cs.779/ref-123 article-title: A classification and characterization of security threats in cloud computing publication-title: International Journal of Next-Generation Computing doi: 10.47164/ijngc.v7i1.307 – start-page: 262 year: 2017 ident: 10.7717/peerj-cs.779/ref-223 article-title: Synaptic: secure and persistent connectivity for containers – volume: 78 start-page: 33837 issue: 23 year: 2019 ident: 10.7717/peerj-cs.779/ref-58 article-title: A cloud compatible dna coded security solution for multimedia file sharing & storage publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-019-08166-z – volume: 72 start-page: 1 issue: 1–2 year: 2020 ident: 10.7717/peerj-cs.779/ref-172 article-title: Ciotas protocol: cloudiot available services protocol through autonomic computing against distributed denial of services attacks publication-title: Journal of Ambient Intelligence and Humanized Computing doi: 10.1007/s12652-020-02556-0 – volume: 1175 start-page: 012101 year: 2019 ident: 10.7717/peerj-cs.779/ref-244 article-title: Lessons learned in applying reactive system in microservices publication-title: Journal of Physics: Conference Series doi: 10.1088/1742-6596/1175/1/012101 – start-page: 50 year: 2015 ident: 10.7717/peerj-cs.779/ref-254 article-title: Security-as-a-service for microservices-based cloud applications – volume: 78 start-page: 3341 issue: 3 year: 2019 ident: 10.7717/peerj-cs.779/ref-217 article-title: Gamifying cultural experiences across the urban environment publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-018-6513-4 – start-page: 1 year: 2018 ident: 10.7717/peerj-cs.779/ref-208 article-title: Towards secure cloud orchestration for multi-cloud deployments – volume: 155 start-page: 441 issue: 9 year: 2019 ident: 10.7717/peerj-cs.779/ref-260 article-title: A cluster of CP-ABE microservices for vanet publication-title: Procedia Computer Science doi: 10.1016/j.procs.2019.08.061 – volume: 19 start-page: 4798 issue: 21 year: 2019 ident: 10.7717/peerj-cs.779/ref-21 article-title: Microservices suite for smart city applications publication-title: Sensors doi: 10.3390/s19214798 – start-page: 9 year: 2017 ident: 10.7717/peerj-cs.779/ref-165 article-title: A secure microservice framework for IoT – start-page: 30 year: 2019 ident: 10.7717/peerj-cs.779/ref-109 article-title: Challenges in adopting continuous delivery and devops in a globally distributed product team: a case study of a healthcare organization – volume: 130 start-page: 456 issue: 2 year: 2018 ident: 10.7717/peerj-cs.779/ref-125 article-title: Defense-in-depth and role authentication for microservice systems publication-title: Procedia Computer Science doi: 10.1016/j.procs.2018.04.047 – start-page: 568 year: 2019 ident: 10.7717/peerj-cs.779/ref-187 article-title: Coordinated dataflow protection for ultra-high bandwidth science networks – start-page: 1224 year: 2020 ident: 10.7717/peerj-cs.779/ref-199 article-title: Generating highly-structured input data by combining search-based testing and grammar-based fuzzing – start-page: 70 year: 2016 ident: 10.7717/peerj-cs.779/ref-284 article-title: Security challenges of small cell as a service in virtualized mobile edge computing environments – start-page: 518 year: 2016 ident: 10.7717/peerj-cs.779/ref-50 article-title: Survey on concern separation in service integration – start-page: 7 year: 2020 ident: 10.7717/peerj-cs.779/ref-167 article-title: Highly-distributed systems based on micro-services and their construction paradigms – volume: 12 start-page: 183 issue: 3–4 year: 2018 ident: 10.7717/peerj-cs.779/ref-182 article-title: A review and future directions of SOA-based software architecture modeling approaches for system of systems publication-title: Service Oriented Computing and Applications doi: 10.1007/s11761-018-0245-1 – volume: 84 start-page: 523 issue: 2 year: 2010 ident: 10.7717/peerj-cs.779/ref-281 article-title: Software survey: vosviewer, a computer program for bibliometric mapping publication-title: Scientometrics doi: 10.1007/s11192-009-0146-3 |
SSID | ssj0001511119 |
Score | 2.3529053 |
Snippet | Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between... |
SourceID | doaj pubmedcentral hal proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | e779 |
SubjectTerms | Analysis Computer networks Computer Science Correlation analysis Data security Datasets Design Distributed processing (Computers) Emerging Technologies Infrastructure Infrastructure-as-a-service Literature reviews Methods Network security Programming Languages Security Security and Privacy Service composition Service deployment Service discovery Software development Software Engineering Systematic review Threat model Web services |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9QwELVouXABylcDLQoViAOKmjjJxuZSbRHLgigHoFJvVjy2W1CVLJtdfj8zjjdLQHBMMkocezzzxh6_Yey5SycODIfEWNTgopA2kSUnQoBKQy64A7-Df_ZpMj8vPlyUF2HBrQtplRub6A21aYHWyI8R6U8qxCqCnyx-JFQ1inZXQwmNHXYzQ09DGi5m77ZrLCUZBNnnu1cYuBwvrF1-T6DDKznyRJ6wfzDLO1eUFfk35Pwzc_I3VzS7y24HDBlP-0HfYzdsc4_d2dRniMN0vc_KM8q263prEHehUt3ruI63_M3x9cCrHPfHWB6w89nbr2_mSSiTkAD64lVSc1_6p0xzm6VamywXFs0YQjEDZsJNxY0xGa-1MzzXBicphkDCOoxUSl4IyB-y3aZt7D6LAcGccBn-XyWKPAUcNon4gVeZBJASIvZq02UKAoc4lbK4VhhLUAcr38EKOrySEXsxSC967ox_yJ1S7w8yxHjtb7TLSxUmkEoNxgGllsJkrgALNUdgqNO8ztC7aucidkRjp4jToqGkmct63XXq_ZfPalql6IMxrsQvvQxCrsV2Qx3OIODfEw3WSPJgJImTDkaPj1BFRi2eTz8quucp9xE2_szwHRsNUsEydGqrxxF7Njym11O2W2PbNcnwEtUZrW_EHvUKN3yKNn4RxBURq0aqOGrL-Enz7crzhgvseZHmj__frCfsFqcjHrTMVB6w3dVybQ8ReK30Uz-7fgG8Mi40 priority: 102 providerName: ProQuest |
Title | Microservice security: a systematic literature review |
URI | https://www.ncbi.nlm.nih.gov/pubmed/35111904 https://www.proquest.com/docview/2616777482 https://www.proquest.com/docview/2625266073 https://inria.hal.science/hal-03915125 https://pubmed.ncbi.nlm.nih.gov/PMC8771803 https://doaj.org/article/0d7725b98d1f4ceca2059b03a1718bff |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3fb5RAEJ7Y-uKLv7W09YKNxgdDCgscu327Nj1PYxtTbdK3DTu7azUN15Q7__7OAEcPjfHFR9gJLMPszDcw-w3AGx-PPVqBkXVkwVmmXKRywYQAhcFUCo_NH_yT0_HsPPt0kV-stfrimrCWHrhV3H5sCf_lRkmb-AwdloIAgYnTMiGvarxn70sxby2ZavcHsytQbaV7QSnL_rVzNz8jrOlIDWJQQ9XfO-SNS66H_BNs_l4zuRaEpo_hYYcew0k76ydwz1VP4dGqM0PYLdRnkJ9wnV3d-oGw7nrUHYRleMfcHF71jMphu4HlOZxPj78dzaKuQUKEFIUXUSmapj95nLokNsYmqXTkwAiEWbRjYQthrU1EabwVqbG0PCn5kc5TjpKLTGL6AjareeW2IESCcdIn9HyFzNIY6YUpQg6iSBSiUhjA-5XKNHbs4dzE4kpTFsEK1o2CNdZ0pAJ420tft6wZf5E7ZO33Msx13ZwgC9CdBeh_WUAAe_zuNLNZVFwu871c1rX--PVMT4qYoi9llHSnd52Qn9O8sex2H9DTMwHWQHJ3IEnLDQfDe2QigxnPJp81n2vI9gkw_kroGisL0p1PqDXlquOC0LYUAbzuh_nyXOdWufmSZUROkIn8bgAvW4Prb8W_fAm-ZQEUA1MczGU4Uv24bBjDJWlexun2_1D3DjwQvAWEP0Plu7C5uFm6VwTMFmYEG3L6YQT3D49Pv5yNmhV5CwHAOZI |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB615QAX3g9DAVNRcUBW7bUd7yIhFB4hoUkP0Eq9be19tKDKDnEC4k_xG5nxKxgEtx5tj9br8Ty-2Z2dAXhq_YFVmilPG5TgKBLGEzGjggBJpkLOrKp28GcHg_FR9OE4Pt6An-1ZGEqrbG1iZah1oWiNfA-R_iBBrMLZq_lXj7pG0e5q20KjFot98-M7hmzly8lb_L-7jI3eHb4Ze01XAU-h61p6Kas65cR-aAI_y3QQcoNaj8hFKz1gOmFa64ClmdUszDTKNEYM3FgE9jGLuApx3E24FIWhoBRCPnq_XtOJyQCJOr8-wUBpb27M4ounSrwSPc9XNQjo3MDmGWVh_g1x_8zU_M31ja7D1QazusNayG7AhslvwrW2H4TbmIdbEM8ou6-srY9bNp3xXripu64X7Z53dZzd-tjMbTi6EAbega28yM09cBWCR24D_L6ER6GvUEwE4hWWBEIpIZQDz1uWSdXULKfWGecSYxdisKwYLFWJV8KB3Y56Xtfq-Afda-J-R0MVtqsbxeJUNgorfY1xR5wJrgMbKaNShkA088M0QG-eWevADv07STU0ckrSOU1XZSknnz7KYeKjz8c4Ft_0rCGyBc5bpc2ZB_x6KrvVo9zuUaKSq97jHRSR3ozHw6mke1WJf4Sp3wIco5Ug2ViiUq71xoEn3WManrLrclOsiIbFCNTQ2jtwtxa47lW00YygMXIg6Yliby79J_nns6pOOUfOcz-8__9pPYbL48PZVE4nB_sP4Aqj4yW0xBVvw9ZysTIPEfQts0eVprlwctGq_QsZkWnu |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Zb9NAEB61RUK8lBsMBUxFxQOyYq_teBcJoUAJCT2EgEp9W-w92qLKDnEC4q_x65jxFQyCtz7aHq3X4zm-2Z2dAXhi_aFVmilPG5TgKBLGEzGjggBJpkLOrKp28A8Oh5Oj6N1xfLwGP9uzMJRW2drEylDrQtEa-QCR_jBBrMLZwDZpEe93xy9nXz3qIEU7rW07jVpE9syP7xi-lS-mu_ivdxgbv_n0euI1HQY8hW5s4aWs6poT-6EJ_CzTQcgNWgBEMVrpIdMJ01oHLM2sZmGmUb4xeuDGIsiPWcRViOOuw6Uk5D51T-Djt6v1nZiMkahz7RMMmgYzY-ZfPFXileh5wapZQOcS1k8pI_NvuPtn1uZvbnB8DTYb_OqOaoG7DmsmvwFX294QbmMqbkJ8QJl-ZW2J3LLpkvfcTd1V7Wj3vKvp7NZHaG7B0YUw8DZs5EVu7oKrEEhyG-D3JTwKfYUiIxC7sCQQSgmhHHjWskyqpn45tdE4lxjHEINlxWCpSrwSDux01LO6bsc_6F4R9zsaqrZd3SjmJ7JRXulrjEHiTHAd2EgZlTIEpZkfpgF69sxaB7bp30mqp5GTZJ6ky7KU048f5Cjx0f9jTItvetoQ2QLnrdLm_AN-PZXg6lFu9ShR4VXv8TaKSG_Gk9G-pHtVuX-ErN8CHKOVINlYpVKudMiBx91jGp4y7XJTLImGxQja0PI7cKcWuO5VtOmMADJyIOmJYm8u_Sf52WlVs5wj57kf3vv_tB7BZVRquT893LsPVxidNKHVrngLNhbzpXmA-G-RPawUzYXPF63ZvwDcRW4b |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Microservice+security%3A+a+systematic+literature+review&rft.jtitle=PeerJ.+Computer+science&rft.au=Berardi%2C+Davide&rft.au=Giallorenzo%2C+Saverio&rft.au=Mauro%2C+Jacopo&rft.au=Melis%2C+Andrea&rft.date=2022-01-05&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=8&rft.spage=e779&rft_id=info:doi/10.7717%2Fpeerj-cs.779&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon |