Microservice security: a systematic literature review

Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and comp...

Full description

Saved in:
Bibliographic Details
Published inPeerJ. Computer science Vol. 7; p. e779
Main Authors Berardi, Davide, Giallorenzo, Saverio, Mauro, Jacopo, Melis, Andrea, Montesi, Fabrizio, Prandini, Marco
Format Journal Article
LanguageEnglish
Published United States PeerJ. Ltd 05.01.2022
PeerJ, Inc
PeerJ
PeerJ Inc
Subjects
Online AccessGet full text
ISSN2376-5992
2376-5992
DOI10.7717/peerj-cs.779

Cover

Loading…
Abstract Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
AbstractList Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined : it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus: it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications-at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
ArticleNumber e779
Audience Academic
Author Montesi, Fabrizio
Prandini, Marco
Mauro, Jacopo
Melis, Andrea
Giallorenzo, Saverio
Berardi, Davide
Author_xml – sequence: 1
  givenname: Davide
  surname: Berardi
  fullname: Berardi, Davide
  organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
– sequence: 2
  givenname: Saverio
  surname: Giallorenzo
  fullname: Giallorenzo, Saverio
  organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy, INRIA, Sophia Antipolis, France
– sequence: 3
  givenname: Jacopo
  surname: Mauro
  fullname: Mauro, Jacopo
  organization: Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark
– sequence: 4
  givenname: Andrea
  surname: Melis
  fullname: Melis, Andrea
  organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
– sequence: 5
  givenname: Fabrizio
  orcidid: 0000-0003-4666-901X
  surname: Montesi
  fullname: Montesi, Fabrizio
  organization: Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark
– sequence: 6
  givenname: Marco
  surname: Prandini
  fullname: Prandini, Marco
  organization: Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
BackLink https://www.ncbi.nlm.nih.gov/pubmed/35111904$$D View this record in MEDLINE/PubMed
https://inria.hal.science/hal-03915125$$DView record in HAL
BookMark eNptkttv0zAUxiM0xC7sjWdUiRcm0eFLHNs8IFUTsEpFSFyeLcc-6VylcbGdQv_7OesYSzXnwfbx73yxP32nxVHnOyiKVxhdco75-w1AWE1NzDv5rDghlFdTJiU5erQ-Ls5jXCGEMMN5yBfFMR1WEpUnBfvqTPARwtYZmEQwfXBp92GiJ3EXE6x1cmbSugRBpz7AJMDWwZ-XxfNGtxHO7-ez4tfnTz-vrqeLb1_mV7PF1FSYpqkmjFFEGKKAUV1bTAUwKliJrLEVsZxYazHRdWMJrW1JGC6FgEZwxkgpDD0r5ntd6_VKbYJb67BTXjt1V_BhqXTIN2xBIcs5YbUUFjelAaMJYrJGVGOORd00WevjXmvT12uwBroUdDsSHZ907kYt_VaJ7LRANAtc7AVuDtquZws11BCV2WLCtjizb-9_FvzvHmJSaxcNtK3uwPdRkYowUlWID7JvDtCV70OXbc0UrjjnpSD_qaXOj3Vd4_MdzSCqZhyJkkspZKYun6DyZ2HtTI5O43J91HAxashMgr9pqfsY1fzH9zH7-rGBDxb8C1MG3u2BIVExQPOAYKSGuKq7uCoT827QIwe4cSnnzQ_2u_bppltpYevk
CitedBy_id crossref_primary_10_1002_smr_2670
crossref_primary_10_1016_j_cities_2022_104071
crossref_primary_10_4236_ojapps_2024_149167
crossref_primary_10_3390_software2030019
crossref_primary_10_1109_ACCESS_2024_3481374
crossref_primary_10_3390_s23010189
crossref_primary_10_3390_s23041755
crossref_primary_10_3390_s25030914
crossref_primary_10_1109_ACCESS_2024_3483659
crossref_primary_10_23939_sisn2024_16_069
crossref_primary_10_3390_app12094424
Cites_doi 10.1002/spe.2931
10.1007/s42979-020-00359-w
10.1007/s11227-014-1251-5
10.1016/j.jss.2020.110710
10.3390/electronics9071172
10.1007/s10586-018-2850-3
10.1109/MS.2019.2947982
10.1007/s40565-018-0425-1
10.1177/001316446002000104
10.1007/s00607-016-0520-y
10.1145/3454122.3456125
10.1186/s13677-019-0141-z
10.1016/j.future.2019.08.020
10.1016/j.cosrev.2020.100308
10.1016/j.promfg.2020.10.153
10.1002/spy2.112
10.1002/smr.2298
10.1016/j.cose.2017.10.006
10.1016/j.promfg.2017.07.197
10.1016/j.future.2019.04.042
10.1007/s10115-018-1248-0
10.1016/S1353-4858(18)30070-9
10.1016/j.jss.2019.110406
10.1016/j.is.2019.06.005
10.1016/j.jss.2020.110720
10.1016/j.adhoc.2020.102153
10.1007/s10619-018-7245-1
10.1016/j.iot.2020.100177
10.1007/978-3-030-58858-8_21
10.1007/s11036-018-1089-9
10.1016/j.future.2018.07.039
10.1002/smr.2263
10.1016/j.jss.2020.110557
10.1016/j.procs.2016.08.278
10.1186/s13174-017-0064-1
10.5383/JUSPN.11.01.003
10.1109/MC.2016.227
10.1109/ACCESS.2020.3044610
10.1016/j.future.2018.05.046
10.1109/ACCESS.2019.2948027
10.3390/s19224905
10.1109/TCCN.2020.2966615
10.1007/s00500-019-04559-2
10.1088/1757-899X/486/1/012109
10.1007/s11036-017-0831-z
10.1016/j.promfg.2020.02.031
10.1016/j.infsof.2017.11.016
10.1016/j.jss.2020.110781
10.1016/j.jss.2020.110564
10.1109/TNET.2018.2890631
10.1002/spe.2513
10.1016/j.jbusres.2019.07.039
10.1016/j.arcontrol.2019.03.005
10.1109/TPDS.2019.2929389
10.1103/PhysRevE.70.066111
10.1007/s10586-017-0897-1
10.1016/j.jss.2020.110798
10.1007/s10664-019-09707-8
10.1016/j.future.2019.07.030
10.1145/3168505
10.1007/978-3-319-62407-5_14
10.1007/978-1-4842-1842-6
10.1007/s00450-016-0337-0
10.1016/j.jss.2018.09.082
10.1002/spy2.18
10.1007/s12083-019-0716-y
10.1016/j.future.2020.03.064
10.1109/ACCESS.2020.3019985
10.1016/j.jisa.2018.11.006
10.1145/3392350.3392351
10.1002/spe.2908
10.1109/COMPSAC.2017.85
10.1145/3277539.3277541
10.1007/978-1-4842-2896-8
10.1007/s10586-020-03150-x
10.1002/cpe.5668
10.1002/cpe.6012
10.1016/j.advengsoft.2019.102734
10.17706/jsw.14.6.257-264
10.1145/3418899
10.1002/smr.1930
10.1145/3356773.3356776
10.1145/3081882
10.1109/ACCESS.2019.2911732
10.1109/SecDev.2019.00027
10.1109/TDSC.2019.2916666
10.1109/TNSM.2018.2889009
10.1088/1742-6596/910/1/012060
10.1016/j.cola.2020.100972
10.14569/IJACSA.2018.090139
10.1007/s12599-016-0447-z
10.1016/j.jnca.2020.102784
10.1016/j.is.2020.101491
10.6028/NIST.SP.800-204
10.1109/MIC.2018.032501519
10.1109/MS.2016.64
10.1145/3378064
10.1007/s10845-019-01516-6
10.1007/s00450-019-00414-9
10.1109/MIC.2019.2956712
10.1007/s10586-018-2874-8
10.1016/j.procs.2019.09.192
10.1016/j.cose.2020.101967
10.1088/1742-6596/1175/1/012101
10.1007/s10664-018-9651-4
10.1007/s13369-018-3140-3
10.3390/s19153292
10.1002/spe.2729
10.3390/fi11060127
10.1145/3396374
10.1007/s10723-019-09498-8
10.1145/3178368.3178371
10.1145/3199665
10.1016/j.sysarc.2019.02.009
10.1007/s10723-018-9453-3
10.1016/j.comcom.2020.03.023
10.1002/cpe.6093
10.1016/j.jbi.2019.103305
10.1002/nem.2132
10.1016/j.procs.2019.09.271
10.1109/ACCESS.2020.2977464
10.1002/9781118988374
10.1016/j.array.2020.100048
10.1002/eng2.12080
10.1016/j.infsof.2019.06.010
10.1007/s00450-019-00413-w
10.1007/978-3-319-57959-7
10.1016/j.promfg.2020.11.055
10.1145/3380322
10.1007/s00607-019-00733-4
10.1109/MCOM.2013.6553677
10.3390/fi9040058
10.1002/cpe.4436
10.1002/9781118181034
10.1145/3301443
10.1002/spe.2761
10.1016/j.ijinfomgt.2019.09.004
10.1016/j.future.2019.06.031
10.1016/j.future.2017.09.020
10.1155/2018/4351603
10.1109/TPDS.2019.2942591
10.1007/s10489-020-02007-5
10.1016/j.iot.2019.100150
10.1109/MCOM.2017.1700089
10.1016/j.entcs.2020.08.007
10.1016/j.compag.2020.105251
10.1007/s00287-019-01178-x
10.1016/j.jmsy.2020.05.017
10.1109/MITP.2018.2876987
10.1007/978-3-319-30070-2
10.1145/3359981
10.7150/ijbs.24617
10.1016/j.jss.2019.01.001
10.47164/ijngc.v7i1.307
10.1007/s11042-019-08166-z
10.1007/s12652-020-02556-0
10.1007/s11042-018-6513-4
10.1016/j.procs.2019.08.061
10.3390/s19214798
10.1016/j.procs.2018.04.047
10.1007/s11761-018-0245-1
10.1007/s11192-009-0146-3
ContentType Journal Article
Copyright 2022 Berardi et al.
COPYRIGHT 2022 PeerJ. Ltd.
2022 Berardi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Attribution
2022 Berardi et al. 2022 Berardi et al.
Copyright_xml – notice: 2022 Berardi et al.
– notice: COPYRIGHT 2022 PeerJ. Ltd.
– notice: 2022 Berardi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: Attribution
– notice: 2022 Berardi et al. 2022 Berardi et al.
DBID AAYXX
CITATION
NPM
ISR
3V.
7XB
8AL
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
7X8
1XC
VOOES
5PM
DOA
DOI 10.7717/peerj-cs.779
DatabaseName CrossRef
PubMed
Gale In Context: Science
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest SciTech Premium Collection Technology Collection Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest - Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
MEDLINE - Academic
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
PubMed Central (Full Participant titles)
DOAJ
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef
PubMed


MEDLINE - Academic
Publicly Available Content Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2376-5992
ExternalDocumentID oai_doaj_org_article_0d7725b98d1f4ceca2059b03a1718bff
PMC8771803
oai_HAL_hal_03915125v1
A708479989
35111904
10_7717_peerj_cs_779
Genre Journal Article
GeographicLocations Italy
GeographicLocations_xml – name: Italy
GrantInformation_xml – fundername: Villum Fonden
  grantid: 29518
– fundername: Independent Research Fund Denmark
  grantid: 0135-00219
GroupedDBID 53G
5VS
8FE
8FG
AAFWJ
AAYXX
ABUWG
ADBBV
AFKRA
AFPKN
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
FRP
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
IAO
ICD
IEA
ISR
ITC
K6V
K7-
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
RPM
3V.
ARCSS
M0N
NPM
PMFND
7XB
8AL
8FK
JQ2
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
7X8
1XC
PUEGO
VOOES
5PM
ID FETCH-LOGICAL-c613t-a255302503e10bbd138e538540dcd62d72ddd12abfd23bd4251488ef8755248c3
IEDL.DBID DOA
ISSN 2376-5992
IngestDate Wed Aug 27 01:29:23 EDT 2025
Thu Aug 21 13:48:08 EDT 2025
Wed Aug 27 07:40:56 EDT 2025
Thu Jul 10 18:25:10 EDT 2025
Fri Jul 25 09:20:49 EDT 2025
Tue Jun 17 20:53:31 EDT 2025
Tue Jun 10 20:21:36 EDT 2025
Fri Jun 27 03:48:30 EDT 2025
Thu Jan 02 22:56:26 EST 2025
Tue Jul 01 02:28:40 EDT 2025
Thu Apr 24 22:57:29 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Authentication and authorization
Privacy
Service deployment
Software development
Authentication
Intrusion detection and prevention
Threat model
Service composition
Service discovery
Infrastructure-as-a-service
Language English
License https://creativecommons.org/licenses/by/4.0
2022 Berardi et al.
Attribution: http://creativecommons.org/licenses/by
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c613t-a255302503e10bbd138e538540dcd62d72ddd12abfd23bd4251488ef8755248c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0003-4666-901X
0000-0002-3658-6395
OpenAccessLink https://doaj.org/article/0d7725b98d1f4ceca2059b03a1718bff
PMID 35111904
PQID 2616777482
PQPubID 2045934
PageCount e779
ParticipantIDs doaj_primary_oai_doaj_org_article_0d7725b98d1f4ceca2059b03a1718bff
pubmedcentral_primary_oai_pubmedcentral_nih_gov_8771803
hal_primary_oai_HAL_hal_03915125v1
proquest_miscellaneous_2625266073
proquest_journals_2616777482
gale_infotracmisc_A708479989
gale_infotracacademiconefile_A708479989
gale_incontextgauss_ISR_A708479989
pubmed_primary_35111904
crossref_primary_10_7717_peerj_cs_779
crossref_citationtrail_10_7717_peerj_cs_779
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-01-05
PublicationDateYYYYMMDD 2022-01-05
PublicationDate_xml – month: 01
  year: 2022
  text: 2022-01-05
  day: 05
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: San Diego
– name: San Diego, USA
PublicationTitle PeerJ. Computer science
PublicationTitleAlternate PeerJ Comput Sci
PublicationYear 2022
Publisher PeerJ. Ltd
PeerJ, Inc
PeerJ
PeerJ Inc
Publisher_xml – name: PeerJ. Ltd
– name: PeerJ, Inc
– name: PeerJ
– name: PeerJ Inc
References Andersen (10.7717/peerj-cs.779/ref-15) 2017
Du (10.7717/peerj-cs.779/ref-90) 2018
Gorige (10.7717/peerj-cs.779/ref-107) 2020
Puliafito (10.7717/peerj-cs.779/ref-220) 2019; 19
Hendrickson (10.7717/peerj-cs.779/ref-118) 2016
Badii (10.7717/peerj-cs.779/ref-21) 2019; 19
Demoulin (10.7717/peerj-cs.779/ref-78) 2018
Pustchi (10.7717/peerj-cs.779/ref-221) 2015
Chen (10.7717/peerj-cs.779/ref-56) 2019
Yang (10.7717/peerj-cs.779/ref-302) 2014; 70
Kelbert (10.7717/peerj-cs.779/ref-142) 2017
Wen (10.7717/peerj-cs.779/ref-293) 2019; 31
Mann (10.7717/peerj-cs.779/ref-173) 2020; 110
Wang (10.7717/peerj-cs.779/ref-290) 2020
Mohammed (10.7717/peerj-cs.779/ref-181) 2020
Kohnfelder (10.7717/peerj-cs.779/ref-145) 1999
Kathiravelu (10.7717/peerj-cs.779/ref-140) 2019; 22
Yarygina (10.7717/peerj-cs.779/ref-304) 2018
Ciavotta (10.7717/peerj-cs.779/ref-60) 2017; 11
Trihinas (10.7717/peerj-cs.779/ref-272) 2018; 22
Ahmed (10.7717/peerj-cs.779/ref-7) 2019; 7
Di Sanzo (10.7717/peerj-cs.779/ref-85) 2021; 51
Salibindla (10.7717/peerj-cs.779/ref-236) 2018; 7
Thanh (10.7717/peerj-cs.779/ref-264) 2016
Abidi (10.7717/peerj-cs.779/ref-1) 2019; 159
Reyna (10.7717/peerj-cs.779/ref-230) 2018; 88
Soldani (10.7717/peerj-cs.779/ref-247) 2018; 146
Zimmermann (10.7717/peerj-cs.779/ref-315) 2017a; 99
De Donno (10.7717/peerj-cs.779/ref-72) 2019; 11
Fetzer (10.7717/peerj-cs.779/ref-96) 2017
Díaz-Sánchez (10.7717/peerj-cs.779/ref-70) 2019; 19
Tenev (10.7717/peerj-cs.779/ref-263) 2020
Truong (10.7717/peerj-cs.779/ref-276) 2020; 9
Adedugbe (10.7717/peerj-cs.779/ref-3) 2019; 24
Ponce (10.7717/peerj-cs.779/ref-216) 2021
Stallenberg (10.7717/peerj-cs.779/ref-249) 2019
Adam (10.7717/peerj-cs.779/ref-2) 2020; 9
Jander (10.7717/peerj-cs.779/ref-125) 2018; 130
Javed (10.7717/peerj-cs.779/ref-128) 2020; 18
Pahl (10.7717/peerj-cs.779/ref-205) 2018
Stewart (10.7717/peerj-cs.779/ref-250) 2012
Kamble (10.7717/peerj-cs.779/ref-136) 2016
Sundelin (10.7717/peerj-cs.779/ref-255) 2020
Mohsin (10.7717/peerj-cs.779/ref-182) 2018; 12
Yu (10.7717/peerj-cs.779/ref-308) 2019; 31
Bandeira (10.7717/peerj-cs.779/ref-25) 2019
Hahn (10.7717/peerj-cs.779/ref-110) 2020
Yarygina (10.7717/peerj-cs.779/ref-305) 2018
Casale (10.7717/peerj-cs.779/ref-47) 2019; 35
Baboi (10.7717/peerj-cs.779/ref-20) 2019; 159
Zdun (10.7717/peerj-cs.779/ref-311) 2019; 37
Mansfield-Devine (10.7717/peerj-cs.779/ref-174) 2018; 2018
Melis (10.7717/peerj-cs.779/ref-178) 2018; 23
Paschke (10.7717/peerj-cs.779/ref-211) 2016; 58
Zimmermann (10.7717/peerj-cs.779/ref-316) 2017b; 32
Krishnan (10.7717/peerj-cs.779/ref-147) 2019; 50
Diekmann (10.7717/peerj-cs.779/ref-86) 2018; 16
Lwakatare (10.7717/peerj-cs.779/ref-169) 2019; 114
Ibrahim (10.7717/peerj-cs.779/ref-121) 2019
ShuLin (10.7717/peerj-cs.779/ref-242) 2020
Leite (10.7717/peerj-cs.779/ref-153) 2020
Di Salle (10.7717/peerj-cs.779/ref-84) 2016
Krämer (10.7717/peerj-cs.779/ref-146) 2019; 99
Chondamrongkul (10.7717/peerj-cs.779/ref-59) 2020
Preuveneers (10.7717/peerj-cs.779/ref-218) 2017; 9
Pahl (10.7717/peerj-cs.779/ref-206) 2018
Jan (10.7717/peerj-cs.779/ref-124) 2019; 24
Oppermann (10.7717/peerj-cs.779/ref-200) 2018; 1
Ravichandran (10.7717/peerj-cs.779/ref-225) 2016
Niknejad (10.7717/peerj-cs.779/ref-193) 2020; 91
Kumar (10.7717/peerj-cs.779/ref-148) 2020; 97
Camilli (10.7717/peerj-cs.779/ref-46) 2017
Wuyts (10.7717/peerj-cs.779/ref-298) 2018
Leite (10.7717/peerj-cs.779/ref-152) 2017; 20
Zhiyi (10.7717/peerj-cs.779/ref-314) 2018; 6
Sultan (10.7717/peerj-cs.779/ref-253) 2019; 7
Bozan (10.7717/peerj-cs.779/ref-35) 2020; 64
Jita (10.7717/peerj-cs.779/ref-132) 2018
Torkura (10.7717/peerj-cs.779/ref-267) 2018
de Toledo (10.7717/peerj-cs.779/ref-75) 2020
Zuo (10.7717/peerj-cs.779/ref-317) 2020; 6
Montesi (10.7717/peerj-cs.779/ref-183) 2018
Paladi (10.7717/peerj-cs.779/ref-208) 2018
Noura (10.7717/peerj-cs.779/ref-198) 2019; 24
Alshuqayran (10.7717/peerj-cs.779/ref-12) 2016
Hajek (10.7717/peerj-cs.779/ref-111) 2020
Trnka (10.7717/peerj-cs.779/ref-273) 2018; 2018
Andersen (10.7717/peerj-cs.779/ref-16) 2018; 14
Russinovich (10.7717/peerj-cs.779/ref-233) 2021; 19
Walker (10.7717/peerj-cs.779/ref-288) 2020; 20
Casale (10.7717/peerj-cs.779/ref-48) 2016; 97
Bertolino (10.7717/peerj-cs.779/ref-30) 2020
Perrone (10.7717/peerj-cs.779/ref-213) 2017
Ahmadvand (10.7717/peerj-cs.779/ref-6) 2018
Zhang (10.7717/peerj-cs.779/ref-312) 2020
DesLauriers (10.7717/peerj-cs.779/ref-79) 2020; 33
Luntovskyy (10.7717/peerj-cs.779/ref-167) 2020
Casalicchio (10.7717/peerj-cs.779/ref-49) 2020; 32
Cheruvu (10.7717/peerj-cs.779/ref-57) 2020
Clauset (10.7717/peerj-cs.779/ref-62) 2004; 70
Dragoni (10.7717/peerj-cs.779/ref-88) 2017
Dash (10.7717/peerj-cs.779/ref-69) 2020; 3
Manu (10.7717/peerj-cs.779/ref-175) 2016
Varghese (10.7717/peerj-cs.779/ref-283) 2018; 79
Haque (10.7717/peerj-cs.779/ref-115) 2020
Wang (10.7717/peerj-cs.779/ref-291) 2018
Xu (10.7717/peerj-cs.779/ref-301) 2019
de Sousa (10.7717/peerj-cs.779/ref-74) 2020
Hole (10.7717/peerj-cs.779/ref-119) 2016
Janjua (10.7717/peerj-cs.779/ref-127) 2020; 9
Balalaie (10.7717/peerj-cs.779/ref-23) 2016; 33
Kochovski (10.7717/peerj-cs.779/ref-144) 2019; 101
Liang (10.7717/peerj-cs.779/ref-160) 2020
Preuveneers (10.7717/peerj-cs.779/ref-219) 2019
Brito (10.7717/peerj-cs.779/ref-38) 2019; 8
Sim (10.7717/peerj-cs.779/ref-244) 2019; 1175
Sharma (10.7717/peerj-cs.779/ref-241) 2020
Fahmideh (10.7717/peerj-cs.779/ref-94) 2020; 87
Basso (10.7717/peerj-cs.779/ref-26) 2017
Baker (10.7717/peerj-cs.779/ref-22) 2019
Khan (10.7717/peerj-cs.779/ref-143) 2020; 32
Osman (10.7717/peerj-cs.779/ref-201) 2019
Wohlin (10.7717/peerj-cs.779/ref-296) 2014
Garriga (10.7717/peerj-cs.779/ref-101) 2017
Lu (10.7717/peerj-cs.779/ref-166) 2021; 51
Yuan (10.7717/peerj-cs.779/ref-309) 2019; 486
Westerlund (10.7717/peerj-cs.779/ref-294) 2018
Zhang (10.7717/peerj-cs.779/ref-313) 2017
Hasan (10.7717/peerj-cs.779/ref-116) 2020; 56
Zaheer (10.7717/peerj-cs.779/ref-310) 2019
Dewanta (10.7717/peerj-cs.779/ref-80) 2020
Beekman (10.7717/peerj-cs.779/ref-27) 2017
Nehme (10.7717/peerj-cs.779/ref-189) 2018
Brenner (10.7717/peerj-cs.779/ref-37) 2017
Di Francesco (10.7717/peerj-cs.779/ref-82) 2019; 150
Salomoni (10.7717/peerj-cs.779/ref-237) 2018; 16
Guija (10.7717/peerj-cs.779/ref-108) 2018
Taherizadeh (10.7717/peerj-cs.779/ref-261) 2020; 140
Brambilla (10.7717/peerj-cs.779/ref-36) 2017; 8
Soldani (10.7717/peerj-cs.779/ref-246) 2019; 44
Nagendra (10.7717/peerj-cs.779/ref-187) 2019
Osman (10.7717/peerj-cs.779/ref-202) 2019
Ali (10.7717/peerj-cs.779/ref-10) 2020; 53
Bhattacharya (10.7717/peerj-cs.779/ref-31) 2019
Hannousse (10.7717/peerj-cs.779/ref-114) 2020
Nikoloudakis (10.7717/peerj-cs.779/ref-195) 2019; 12
Souppaya (10.7717/peerj-cs.779/ref-248) 2017
Kalske (10.7717/peerj-cs.779/ref-135) 2017
Anisetti (10.7717/peerj-cs.779/ref-17) 2019
Shahin (10.7717/peerj-cs.779/ref-240) 2019; 24
Bumblauskas (10.7717/peerj-cs.779/ref-42) 2020; 52
Ranawaka (10.7717/peerj-cs.779/ref-222) 2020
Hsu (10.7717/peerj-cs.779/ref-120) 2018
Trihinas (10.7717/peerj-cs.779/ref-271) 2016
Tuma (10.7717/peerj-cs.779/ref-277) 2020
Lou (10.7717/peerj-cs.779/ref-164) 2020; 51
Garg (10.7717/peerj-cs.779/ref-100) 2019
Moura (10.7717/peerj-cs.779/ref-186) 2020; 169
Walsh (10.7717/peerj-cs.779/ref-289) 2017
Morris (10.7717/peerj-cs.779/ref-185) 2017; 2017
Moreira (10.7717/peerj-cs.779/ref-184) 2020; 30
Bánáti (10.7717/peerj-cs.779/ref-24) 2018
Ranjbar (10.7717/peerj-cs.779/ref-223) 2017
Van Eck (10.7717/peerj-cs.779/ref-281) 2010; 84
Redelinghuys (10.7717/peerj-cs.779/ref-228) 2019; 31
Mishra (10.7717/peerj-cs.779/ref-179) 2020; 38
Rao (10.7717/peerj-cs.779/ref-224) 2018; 60
Brucker (10.7717/peerj-cs.779/ref-41) 2017; 47
Cerny (10.7717/peerj-cs.779/ref-52) 2020; 8
Syed (10.7717/peerj-cs.779/ref-259) 2018
Nikouei (10.7717/peerj-cs.779/ref-196) 2019
Lenarduzzi (10.7717/peerj-cs.779/ref-155) 2020; 169
Cerny (10.7717/peerj-cs.779/ref-50) 2016
Liu (10.7717/peerj-cs.779/ref-163) 2020
George (10.7717/peerj-cs.779/ref-102) 2017; 1
Chandramouli (10.7717/peerj-cs.779/ref-53) 2019; 800
Bogatinovski (10.7717/peerj-cs.779/ref-33) 2020
Bromberg (10.7717/peerj-cs.779/ref-39) 2020
Clancy (10.7717/peerj-cs.779/ref-61) 2019
Vale (10.7717/peerj-cs.779/ref-280) 2019
Otterstad (10.7717/peerj-cs.779/ref-203) 2017
Vaquero (10.7717/peerj-cs.779/ref-282) 2019; 90
Di Francesco (10.7717/peerj-cs.779/ref-83) 2017
Kang (10.7717/peerj-cs.779/ref-138) 2018
Esposito (10.7717/peerj-cs.779/ref-93) 2017; 55
Prandi (10.7717/peerj-cs.779/ref-217) 2019; 78
Taha (10.7717/peerj-cs.779/ref-260) 2019; 155
Akkermans (10.7717/peerj-cs.779/ref-8) 2018
Luo (10.7717/peerj-cs.779/ref-168) 2018
Lakhan (10.7717/peerj-cs.779/ref-150) 2020; 102
Roca (10.7717/peerj-cs.779/ref-231) 2020; 102
Almeida (10.7717/peerj-cs.779/ref-11) 2017
Yang (10.7717/peerj-cs.779/ref-303) 2018; 14
Beheshti (10.7717/peerj-cs.779/ref-28) 2019; 37
da Silva (10.7717/peerj-cs.779/ref-67) 2019
Jander (10.7717/peerj-cs.779/ref-126) 2019; 11
Buzachis (10.7717/peerj-cs.779/ref-43) 2018
Kapferer (10.7717/peerj-cs.779/ref-139) 2020
Xu (10.7717/peerj-cs.779/ref-300) 2019; 19
Torkura (10.7717/peerj-cs.779/ref-269) 2017
Petrovska (10.7717/peerj-cs.779/ref-214) 2019
Baarzi (10.7717/peerj-cs.779/ref-19) 2020
Li (10.7717/peerj-cs.779/ref-158) 2019a
Wieber (10.7717/peerj-cs.779/ref-295) 2020
Jaworski (10.7717/peerj-cs.779/ref-129) 2019
Di Ciccio (10.7717/peerj-cs.779/ref-81) 2019; 42
Panduman (10.7717/peerj-cs.779/ref-209) 2019
Ghayyur (10.7717/peerj-cs.779/ref-104) 2018; 9
Kang (10.7717/peerj-cs.779/ref-137) 2019
Costa (10.7717/peerj-cs.779/ref-66) 2020; 169
Pahl (10.7717/peerj-cs.779/ref-207) 2018
Łaskawiec (10.7717/peerj-cs.779/ref-151) 2019; 22
Pentikousis (10.7717/peerj-cs.779/ref-212) 2013; 51
Tourani (10.7717/peerj-cs.779/ref-270) 2019
Agarwal (10.7717/peerj-cs.779/ref-4) 2019; 27
Waseem (10.7717/peerj-cs.779/ref-292) 2020; 170
Nkomo (10.7717/peerj-cs.779/ref-197) 2019
Voigt (10.7717/peerj-cs.779/ref-286) 2017
Islam (10.7717/peerj-cs.779/ref-123) 2016; 7
Dilshan (10.7717/peerj-cs.779/ref-87) 2020
Callegati (10.7717/peerj-cs.779/ref-44) 2016
Surantha (10.7717/peerj-cs.779/ref-257) 2019
Bélair (10.7717/peerj-cs.779/ref-29) 2019
Joseph (10.7717/peerj-cs.779/ref-133) 2019; 49
Kallergis (10.7717/peerj-cs.779/ref-134) 2020; 104
Alulema (10.7717/p
References_xml – year: 2016
  ident: 10.7717/peerj-cs.779/ref-118
  article-title: Serverless computation with openlambda
– volume: 51
  start-page: 1059
  issue: 5
  year: 2021
  ident: 10.7717/peerj-cs.779/ref-166
  article-title: Integrated model-driven engineering of blockchain applications for business processes and asset management
  publication-title: Software: Practice and Experience
  doi: 10.1002/spe.2931
– year: 2016
  ident: 10.7717/peerj-cs.779/ref-271
  article-title: Designing scalable and secure microservices by embracing devops-as-a-service offerings
– volume: 1
  start-page: 1
  issue: 6
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-227
  article-title: A systematic review on software architectures for iot systems and future direction to the adoption of microservices architecture
  publication-title: SN Computer Science
  doi: 10.1007/s42979-020-00359-w
– start-page: 932
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-267
  article-title: A cyber risk based moving target defense mechanism for microservice architectures
– volume: 70
  start-page: 408
  issue: 1
  year: 2014
  ident: 10.7717/peerj-cs.779/ref-302
  article-title: Cloud computing in e-science: research challenges and opportunities
  publication-title: The Journal of Supercomputing
  doi: 10.1007/s11227-014-1251-5
– start-page: 45
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-132
  article-title: A framework to apply the internet of things for medical care in a home environment
– volume: 169
  start-page: 110710
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-155
  article-title: Does migrating a monolithic system to microservices decrease the technical debt?
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110710
– start-page: 425
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-80
  article-title: Secure microservices deployment for fog computing services in a remote office
– volume: 9
  start-page: 1172
  issue: 7
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-127
  article-title: Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies
  publication-title: Electronics
  doi: 10.3390/electronics9071172
– volume: 22
  start-page: 829
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-151
  article-title: New solutions for exposing clustered applications deployed in the cloud
  publication-title: Cluster Computing
  doi: 10.1007/s10586-018-2850-3
– year: 2020
  ident: 10.7717/peerj-cs.779/ref-114
  article-title: Securing microservices and microservice architectures: a systematic mapping study
– volume: 37
  start-page: 87
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-311
  article-title: Emerging trends, challenges, and experiences in devops and microservice Apis
  publication-title: IEEE Software
  doi: 10.1109/MS.2019.2947982
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-188
  article-title: A microservice-enabled architecture for smart surveillance using blockchain technology
– start-page: 47
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-313
  article-title: Towards effective virtualization of intrusion detection systems
– start-page: 72
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-205
  article-title: All eyes on you: distributed multi-dimensional iot microservice anomaly detection
– start-page: 467
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-100
  article-title: Automated cloud infrastructure, continuous integration and continuous delivery using docker with robust container security
– volume: 6
  start-page: 900
  issue: 5
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-314
  article-title: Cyber-secure decentralized energy management for iot-enabled active distribution networks
  publication-title: Journal of Modern Power Systems and Clean Energy
  doi: 10.1007/s40565-018-0425-1
– start-page: 389
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-56
  article-title: Informer: irregular traffic detection for containerized microservices rpc in the real world
– volume: 20
  start-page: 37
  issue: 1
  year: 1960
  ident: 10.7717/peerj-cs.779/ref-64
  article-title: A coefficient of agreement for nominal scales
  publication-title: Educational and Psychological Measurement
  doi: 10.1177/001316446002000104
– start-page: 48
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-163
  article-title: Unsupervised detection of microservice trace anomalies through service-level deep Bayesian networks
– volume: 99
  start-page: 129
  issue: 2
  year: 2017a
  ident: 10.7717/peerj-cs.779/ref-315
  article-title: Architectural refactoring for the cloud: a decision-centric view on cloud migration
  publication-title: Computing
  doi: 10.1007/s00607-016-0520-y
– start-page: 1
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-44
  article-title: Data security issues in maas-enabling platforms
– volume: 19
  start-page: 49
  issue: 1
  year: 2021
  ident: 10.7717/peerj-cs.779/ref-233
  article-title: Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
  publication-title: Queue
  doi: 10.1145/3454122.3456125
– volume: 8
  start-page: 1
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-38
  article-title: Secure end-to-end processing of smart metering data
  publication-title: Journal of Cloud Computing
  doi: 10.1186/s13677-019-0141-z
– volume: 102
  start-page: 775
  issue: 9
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-99
  article-title: Secure cloud-edge deployments, with trust
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.08.020
– volume: 38
  start-page: 100308
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-179
  article-title: Devops and software quality: a systematic mapping
  publication-title: Computer Science Review
  doi: 10.1016/j.cosrev.2020.100308
– volume: 51
  start-page: 1091
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-194
  article-title: A microservice architecture for predictive analytics in manufacturing
  publication-title: Procedia Manufacturing
  doi: 10.1016/j.promfg.2020.10.153
– volume: 3
  start-page: e112
  issue: 5
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-69
  article-title: Model based iot security framework using multiclass adaptive boosting with smote
  publication-title: Security and Privacy
  doi: 10.1002/spy2.112
– start-page: e2298
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-30
  article-title: Devopret: continuous reliability testing in devops
  publication-title: Journal of Software: Evolution and Process
  doi: 10.1002/smr.2298
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-67
  article-title: Squad: a secure, simple storage service for SGX-based microservices
– start-page: 332
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-277
  article-title: Automating the early detection of security design flaws
– volume: 74
  start-page: 277
  issue: 7
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-45
  article-title: Cloud-of-things meets mobility-as-a-service: an insider threat perspective
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2017.10.006
– start-page: 11
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-305
  article-title: Overcoming security challenges in microservice architectures
– volume: 11
  start-page: 931
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-60
  article-title: A microservice-based middleware for the digital factory
  publication-title: Procedia Manufacturing
  doi: 10.1016/j.promfg.2017.07.197
– volume: 99
  start-page: 308
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-146
  article-title: Implementing secure applications in smart city clouds using microservices
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.04.042
– start-page: 342
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-33
  article-title: Self-supervised anomaly detection from distributed traces
– start-page: 255
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-25
  article-title: We need to talk about microservices: an analysis from the discussions on stackoverflow
– start-page: 122
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-74
  article-title: Building a prototype based on microservices and blockchain technologies for notary’s office: an academic experience report
– start-page: 195
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-75
  article-title: Improving agility by managing shared libraries in microservices
– volume: 60
  start-page: 1
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-224
  article-title: The big data system, components, tools, and technologies: a survey
  publication-title: Knowledge and Information Systems
  doi: 10.1007/s10115-018-1248-0
– start-page: 49
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-310
  article-title: eztrust: network-independent zero-trust perimeterization for microservices
– start-page: 140
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-110
  article-title: Mismesh: Security issues and challenges in service meshes
– volume: 2018
  start-page: 15
  issue: 7
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-174
  article-title: Devops: finding room for security
  publication-title: Network Security
  doi: 10.1016/S1353-4858(18)30070-9
– volume: 158
  start-page: 110406
  issue: 10
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-232
  article-title: Deeplink: recovering issue-commit links based on deep learning
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2019.110406
– volume: 87
  start-page: 101409
  issue: 10
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-94
  article-title: An exploration of iot platform development
  publication-title: Information Systems
  doi: 10.1016/j.is.2019.06.005
– volume: 169
  start-page: 110720
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-66
  article-title: Towards the adoption of omg standards in the development of soa-based iot systems
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110720
– volume: 104
  start-page: 102153
  issue: Pt. 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-134
  article-title: Capodaz: a containerised authorisation and policy-driven architecture using microservices
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2020.102153
– start-page: 187
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-34
  article-title: Microservices in industry: insights into technologies, characteristics, and software quality
– start-page: 17
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-156
  article-title: VNIDS: towards elastic security with safe and efficient virtualization of network intrusion detection systems
– volume: 37
  start-page: 351
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-28
  article-title: Datasynapse: a social data curation foundry
  publication-title: Distributed and Parallel Databases
  doi: 10.1007/s10619-018-7245-1
– start-page: 79
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-59
  article-title: Automated security analysis for microservice architecture
– start-page: 560
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-90
  article-title: Anomaly detection and diagnosis for container-based microservices with performance monitoring
– volume: 9
  start-page: 100177
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-2
  article-title: The fog cloud of things: a survey on concepts, architecture, standards, tools, and applications
  publication-title: Iternet of Thing
  doi: 10.1016/j.iot.2020.100177
– start-page: 1
  year: 2014
  ident: 10.7717/peerj-cs.779/ref-296
  article-title: Guidelines for snowballing in systematic literature studies and a replication in software engineering
– start-page: 203
  volume-title: Agile Processes in Software Engineering and Extreme Programming – Workshops
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-65
  article-title: Certification as a service
  doi: 10.1007/978-3-030-58858-8_21
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-312
  article-title: Fenghuolun: a federated learning based edge computing platform for cyber-physical systems
– volume: 24
  start-page: 796
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-198
  article-title: Interoperability in internet of things: taxonomies and open challenges
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-018-1089-9
– volume: 90
  start-page: 20
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-282
  article-title: Research challenges in nextgen service orchestration
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2018.07.039
– volume: 32
  start-page: e2263
  issue: 10
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-143
  article-title: Multicriteria decision-making taxonomy for devops challenging factors using analytical hierarchy process
  publication-title: Journal of Software: Evolution and Process
  doi: 10.1002/smr.2263
– volume: 164
  start-page: 110557
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-226
  article-title: Arc: anomaly-aware robust cloud-integrated iot service composition based on uncertainty in advertised quality of service values
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110557
– volume: 97
  start-page: 34
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-48
  article-title: Current and future challenges of software engineering for services and applications
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2016.08.278
– year: 2019
  ident: 10.7717/peerj-cs.779/ref-22
  article-title: A novel approach to secure microservice architecture from owasp vulnerabilities
– volume: 8
  start-page: 14
  issue: 1
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-36
  article-title: Model-driven development of user interfaces for IoT systems via domain-specific components and patterns
  publication-title: Journal of Internet Services and Applications
  doi: 10.1186/s13174-017-0064-1
– volume: 11
  start-page: 17
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-126
  article-title: Practical defense-in-depth solution for microservice systems
  publication-title: Journal of Ubiquitous Systems & Pervasive Networks
  doi: 10.5383/JUSPN.11.01.003
– start-page: 655
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-294
  article-title: Towards distributed clouds: a review about the evolution of centralized cloud computing, distributed ledger technologies, and a foresight on unifying opportunities and security implications
– volume: 49
  start-page: 62
  issue: 8
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-170
  article-title: Vendor malware: detection limits and mitigation
  publication-title: Computer
  doi: 10.1109/MC.2016.227
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-115
  article-title: Challenges in docker development: a large-scale study using stack overflow
– volume: 8
  start-page: 226397
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-131
  article-title: An anomaly detection algorithm for microservice architecture based on robust principal component analysis
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3044610
– start-page: 49
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-203
  article-title: Low-level exploitation mitigation by diverse microservices
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-160
  article-title: On the design of a blockchain-based student quality assessment system
– volume: 88
  start-page: 173
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-230
  article-title: On blockchain and its integration with iot. challenges and opportunities
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2018.05.046
– volume: 7
  start-page: 155472
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-7
  article-title: Service management for IoT: requirements, taxonomy, recent advances and open research challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2948027
– volume: 19
  start-page: 4905
  issue: 22
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-300
  article-title: Microservice security agent based on api gateway in edge computing
  publication-title: Sensors
  doi: 10.3390/s19224905
– volume: 6
  start-page: 548
  issue: 2
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-317
  article-title: An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis
  publication-title: IEEE Transactions on Cognitive Communications and Networking
  doi: 10.1109/TCCN.2020.2966615
– start-page: 203
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-101
  article-title: Towards a taxonomy of microservices architectures
– start-page: 24
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-122
  article-title: Immunizer: a scalable loosely-coupled self-protecting software framework using adaptive microagents and parallelized microservices
– volume: 24
  start-page: 5999
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-3
  article-title: Leveraging cloud computing for the semantic web: review and trends
  publication-title: Soft Computing
  doi: 10.1007/s00500-019-04559-2
– start-page: 39
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-241
  article-title: Towards trustworthy and independent data marketplaces
– volume: 486
  start-page: 012109
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-309
  article-title: Research on power trading platform based on big data and artificial intelligence technology
  publication-title: IOP Conference Series: Materials Science and Engineering
  doi: 10.1088/1757-899X/486/1/012109
– volume: 23
  start-page: 167
  issue: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-178
  article-title: Integrating personalized and accessible itineraries in maas ecosystems through microservices
  publication-title: Mobile Networks and Applications
  doi: 10.1007/s11036-017-0831-z
– start-page: 38
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-243
  article-title: Bring your own identity-case study from the swiss government
– volume: 42
  start-page: 111
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-251
  article-title: Middleware-based cyber-physical production system modeling for operators
  publication-title: Procedia Manufacturing
  doi: 10.1016/j.promfg.2020.02.031
– volume: 95
  start-page: 329
  issue: 10
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-275
  article-title: Exploiting load testing and profiling for performance antipattern detection
  publication-title: Information and Software Technology
  doi: 10.1016/j.infsof.2017.11.016
– start-page: 1
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-96
  article-title: Integrating reactive cloud applications in sereca
– volume: 170
  start-page: 110781
  issue: 2
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-106
  article-title: Continuous experimentation and the cyber-physical systems challenge: an overview of the literature and the industrial perspective
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110781
– start-page: 169
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-306
  article-title: A game of microservices: automated intrusion response
– volume: 165
  start-page: 110564
  issue: 9
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-18
  article-title: Scalability assessment of microservice architecture deployment configurations: a domain-based approach leveraging operational profiles and load tests
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110564
– volume: 27
  start-page: 433
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-4
  article-title: VNF placement and resource allocation for the support of vertical services in 5g networks
  publication-title: IEEE/ACM Transactions on Networking
  doi: 10.1109/TNET.2018.2890631
– start-page: 142
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-290
  article-title: Root-cause metric location for microservice systems via log anomaly detection
– volume: 47
  start-page: 1923
  issue: 12
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-41
  article-title: Modelling, validating, and ranking of secure service compositions
  publication-title: Software: Practice and Experience
  doi: 10.1002/spe.2513
– volume: 104
  start-page: 333
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-245
  article-title: Literature review as a research methodology: an overview and guidelines
  publication-title: Journal of Business Research
  doi: 10.1016/j.jbusres.2019.07.039
– start-page: 398
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-157
  article-title: Exploring the challenges of developing and operating consortium blockchains: a case study
– start-page: 278
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-32
  article-title: A toolbox for realtime timeseries anomaly detection
– volume: 47
  start-page: 237
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-265
  article-title: Cpus-IoT: a cyber-physical microservice and iot-based framework for manufacturing assembly systems
  publication-title: Annual Reviews in Control
  doi: 10.1016/j.arcontrol.2019.03.005
– volume: 31
  start-page: 129
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-293
  article-title: Ga-par: dependable microservice orchestration framework for geo-distributed clouds
  publication-title: IEEE Transactions on Parallel and Distributed Systems
  doi: 10.1109/TPDS.2019.2929389
– start-page: 12
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-176
  article-title: μ NDN: an orchestrated microservice architecture for named data networking
– start-page: 224
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-235
  article-title: Information system development for restricting access to software tool built on microservice architecture
– start-page: 131
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-97
  article-title: Improving the security of microservice systems by detecting and tolerating intrusions
– volume: 70
  start-page: 066111
  issue: 6
  year: 2004
  ident: 10.7717/peerj-cs.779/ref-62
  article-title: Finding community structure in very large networks
  publication-title: Physical Review E
  doi: 10.1103/PhysRevE.70.066111
– start-page: 90
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-269
  article-title: Leveraging cloud native design patterns for security-as-a-service applications
– volume: 20
  start-page: 1951
  issue: 3
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-152
  article-title: Dohko: an autonomic system for provision, configuration, and management of inter-cloud environments based on a software product line engineering method
  publication-title: Cluster Computing
  doi: 10.1007/s10586-017-0897-1
– volume: 170
  start-page: 110798
  issue: 12
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-292
  article-title: A systematic mapping study on microservices architecture in devops
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2020.110798
– start-page: 504
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-141
  article-title: Towards evolving security requirements of industrial internet: a layered security architecture solution based on data transfer techniques
– volume: 24
  start-page: 3696
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-124
  article-title: Search-based multi-vulnerability testing of xml injections in web applications
  publication-title: Empirical Software Engineering
  doi: 10.1007/s10664-019-09707-8
– volume: 101
  start-page: 747
  issue: 4
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-144
  article-title: Trust management in a blockchain based fog computing platform with trustless smart oracles
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.07.030
– volume: 61
  start-page: 58
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-239
  article-title: Monitoring in a devops world
  publication-title: Communications of the ACM
  doi: 10.1145/3168505
– start-page: 203
  volume-title: Computational Science and Its Applications – ICCSA 2017
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-287
  article-title: A systematic literature review on microservices
  doi: 10.1007/978-3-319-62407-5_14
– start-page: 467
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-138
  article-title: Distributed monitoring system for microservices-based iot middleware system
– volume-title: DevOps for digital leaders
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-225
  doi: 10.1007/978-1-4842-1842-6
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-87
  article-title: Mschain: blockchain based decentralized certificate transparency for microservices
– start-page: 246
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-171
  article-title: Automap: diagnose your microservice-based web applications automatically
– volume-title: The threats to our products
  year: 1999
  ident: 10.7717/peerj-cs.779/ref-145
– volume: 32
  start-page: 301
  issue: 3–4
  year: 2017b
  ident: 10.7717/peerj-cs.779/ref-316
  article-title: Microservices tenets
  publication-title: Computer Science-Research and Development
  doi: 10.1007/s00450-016-0337-0
– volume: 146
  start-page: 215
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-247
  article-title: The pains and gains of microservices: a systematic grey literature review
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2018.09.082
– volume: 1
  start-page: e18
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-200
  article-title: Secure cloud computing: Reference architecture for measuring instrument under legal control
  publication-title: Security and Privacy
  doi: 10.1002/spy2.18
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-280
  article-title: Security mechanisms used in microservices-based systems: a systematic mapping
– start-page: 282
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-142
  article-title: Securecloud: secure big data processing in untrusted clouds
– volume: 12
  start-page: 1216
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-195
  article-title: Vulnerability assessment as a service for fog-centric ICT ecosystems: a healthcare use case
  publication-title: Peer-to-Peer Networking and Applications
  doi: 10.1007/s12083-019-0716-y
– volume-title: DevOps: continuous delivery, integration, and deployment with DevOps: dive into the core DevOps strategies
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-279
– volume: 110
  start-page: 243
  issue: 8
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-173
  article-title: Secure software placement and configuration
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2020.03.064
– start-page: 390
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-111
  article-title: The necessity of interdisciplinary software development for building viable research platforms: case study in automated drug delivery in diabetes
– start-page: 358
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-270
  article-title: Towards security-as-a-service in multi-access edge
– start-page: 250
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-107
  article-title: Privacy-risk detection in microservices composition using distributed tracing
– start-page: 1090
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-249
  article-title: Jcomix: a search-based tool to detect xml injection vulnerabilities in web applications
– volume-title: Hands-on security in DevOps: ensure continuous security, deployment, and delivery with DevSecOps
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-120
– year: 2016
  ident: 10.7717/peerj-cs.779/ref-136
– start-page: 59
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-8
  article-title: Polyglot cerberos: resource security, interoperability and multi-tenancy for IoT services on a multilingual platform
– volume: 8
  start-page: 159449
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-52
  article-title: On code analysis opportunities and challenges for enterprise systems and microservices
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3019985
– start-page: 1
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-258
  article-title: The container manager pattern
– volume: 44
  start-page: 32
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-91
  article-title: Offering security diagnosis as a service for cloud saas applications
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2018.11.006
– start-page: 59
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-289
  article-title: Mechanisms for mutual attested microservice communication
– volume: 20
  start-page: 5
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-288
  article-title: On cloud computing infrastructure for existing code-clone detection algorithms
  publication-title: ACM SIGAPP Applied Computing Review
  doi: 10.1145/3392350.3392351
– volume: 51
  start-page: 46
  issue: 1
  year: 2021
  ident: 10.7717/peerj-cs.779/ref-85
  article-title: Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies
  publication-title: Software: Practice and Experience
  doi: 10.1002/spe.2908
– start-page: 57
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-168
  article-title: High performance userspace networking for containerized microservices
– start-page: 238
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-209
  article-title: A survey of IoT platform comparison for building cyber-physical system architecture
– year: 2017
  ident: 10.7717/peerj-cs.779/ref-248
  article-title: Application container security guide (2nd draft)
– year: 2020
  ident: 10.7717/peerj-cs.779/ref-204
  article-title: Open web application security project (OWASP) application threat modeling
– volume: 1
  start-page: 649
  volume-title: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-102
  article-title: Claimsware: a claims-based middleware for securing iot services
  doi: 10.1109/COMPSAC.2017.85
– start-page: 187
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-46
  article-title: A formal framework for specifying and verifying microservices based process flows
– start-page: 262
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-274
  article-title: Big data platform for integrated cyber and physical security of critical infrastructures for the financial sector: critical infrastructures as cyber-physical systems
– volume: 16
  start-page: 44
  issue: 4
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-92
  article-title: Tracking and controlling microservice dependencies
  publication-title: Queue
  doi: 10.1145/3277539.3277541
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-201
  article-title: Sandnet: towards high quality of deception in container-based microservice architectures
– start-page: 285
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-61
  article-title: Post-quantum cryptography and 5g security: tutorial
– start-page: 255
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-129
  article-title: Microservice-based cloud application ported to unikernels: performance comparison of different technologies
– volume-title: Demystifying internet of things security: successful iot device/edge and platform security deployment
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-57
  doi: 10.1007/978-1-4842-2896-8
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-181
  article-title: Security architectures for sensitive data in cloud computing
– volume: 23
  start-page: 1937
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-13
  article-title: A model-driven engineering approach for the service integration of iot systems
  publication-title: Cluster Computing
  doi: 10.1007/s10586-020-03150-x
– volume: 32
  start-page: e5668
  issue: 17
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-49
  article-title: The state-of-the-art in container technologies: application, orchestration and security
  publication-title: Concurrency and Computation: Practice and Experience
  doi: 10.1002/cpe.5668
– volume: 33
  start-page: e6012
  issue: 23
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-149
  article-title: Protocol fuzzing to find security vulnerabilities of rabbitMQ
  publication-title: Concurrency and Computation: Practice and Experience
  doi: 10.1002/cpe.6012
– start-page: 1
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-175
  article-title: Docker container security via heuristics-based multilateral security-conceptual and pragmatic study
– volume: 140
  start-page: 102734
  issue: 9
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-261
  article-title: Key influencing factors of the kubernetes auto-scaler for computing-intensive microservice-native cloud-based applications
  publication-title: Advances in Engineering Software
  doi: 10.1016/j.advengsoft.2019.102734
– volume: 14
  start-page: 257
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-191
  article-title: Applying spring security framework and oauth2 to protect microservice architecture API
  publication-title: Journal of Software
  doi: 10.17706/jsw.14.6.257-264
– volume: 17
  start-page: 1
  issue: 4
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-40
  article-title: A black-box monitoring approach to measure microservices runtime performance
  publication-title: ACM Transactions on Architecture and Code Optimization (TACO)
  doi: 10.1145/3418899
– volume: 30
  start-page: e1930
  issue: 7
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-215
  article-title: Software architectures for health care cyber-physical systems: a systematic literature review
  publication-title: Journal of Software: Evolution and Process
  doi: 10.1002/smr.1930
– volume-title: CISSP: certified information systems security professional study guide
  year: 2012
  ident: 10.7717/peerj-cs.779/ref-250
– volume: 44
  start-page: 11
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-246
  article-title: Grey literature: a safe bridge between academy and industry?
  publication-title: ACM SIGSOFT Software Engineering Notes
  doi: 10.1145/3356773.3356776
– start-page: 189
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-139
  article-title: Domain-driven service design
– start-page: 348
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-257
  article-title: Secure kubernetes networking design based on zero trust model: A case study of financial service enterprise in indonesia
– volume: 2017
  start-page: 1
  issue: May
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-185
  article-title: 10 rules for an unhackable data vault
  publication-title: Ubiquity
  doi: 10.1145/3081882
– volume: 7
  start-page: 52976
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-253
  article-title: Container security: issues, challenges, and the road ahead
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2911732
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-206
  article-title: Securing IoT microservices with certificates
– start-page: 144
  volume-title: 2019 IEEE Cybersecurity Development (SecDev)
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-54
  article-title: With great abstraction comes great responsibility: Sealing the microservices attack surface
  doi: 10.1109/SecDev.2019.00027
– start-page: 1
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-213
  article-title: The docker security playground: a hands-on approach to the study of network security
– start-page: 177
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-37
  article-title: Secure cloud micro services using Intel SGX
– volume: 18
  start-page: 1125
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-130
  article-title: Dseom: a framework for dynamic security evaluation and optimization of mtd in container-based cloud
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2019.2916666
– start-page: 1158
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-295
  article-title: Automated generation of client-specific backends utilizing existing microservices and architectural knowledge
– volume: 16
  start-page: 41
  issue: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-86
  article-title: Agile network access control in the container age
  publication-title: IEEE Transactions on Network and Service Management
  doi: 10.1109/TNSM.2018.2889009
– volume: 910
  start-page: 012060
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-117
  article-title: Authentication and authorization of end user in microservice architecture
  publication-title: Journal of Physics: Conference Series
  doi: 10.1088/1742-6596/910/1/012060
– volume: 59
  start-page: 100972
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-180
  article-title: Applications of model-driven engineering in cyber-physical systems: a systematic mapping study
  publication-title: Journal of Computer Languages
  doi: 10.1016/j.cola.2020.100972
– volume: 9
  start-page: 284
  issue: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-104
  article-title: Matrix clustering based migration of system application to microservices architecture
  publication-title: International Journal of Advanced Computer Science and Applications
  doi: 10.14569/IJACSA.2018.090139
– start-page: 32
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-135
  article-title: Challenges when moving from monolith to microservice architecture
– volume: 58
  start-page: 329
  issue: 5
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-211
  article-title: Provalets: component-based mobile agents as microservices for rule-based data access, processing and analytics
  publication-title: Business & Information Systems Engineering
  doi: 10.1007/s12599-016-0447-z
– start-page: 1733
  volume-title: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-183
  article-title: From the decorator pattern to circuit breakers in microservices
– start-page: 31
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-31
  article-title: Smart proxying for microservices
– volume: 169
  start-page: 102784
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-186
  article-title: Fog computing systems: state of the art, research issues and future trends, with a focus on resilience
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2020.102784
– start-page: 436
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-84
  article-title: Composition of advanced (μ) services for the next generation of the internet of things
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-29
  article-title: Leveraging kernel security mechanisms to improve container security: a survey
– start-page: 38
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-210
  article-title: Secure volume hot-plugging for containers (industry track)
– volume: 91
  start-page: 101491
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-193
  article-title: Understanding service-oriented architecture (SOA): a systematic literature review and directions for further investigation
  publication-title: Information Systems
  doi: 10.1016/j.is.2020.101491
– start-page: 564
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-301
  article-title: Blendmas: a blockchain-enabled decentralized microservices architecture for smart public safety
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-112
  article-title: Toward scaling hardware security module for emerging cloud services
– volume: 800
  start-page: 204
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-53
  article-title: Microservices-based application systems
  publication-title: NIST Special Publication
  doi: 10.6028/NIST.SP.800-204
– start-page: 29
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-219
  article-title: Towards multi-party policy-based access control in federations of cloud and edge microservices
– volume: 22
  start-page: 65
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-272
  article-title: Devops as a service: pushing the boundaries of microservice adoption
  publication-title: IEEE Internet Computing
  doi: 10.1109/MIC.2018.032501519
– volume: 33
  start-page: 42
  issue: 3
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-23
  article-title: Microservices architecture enables devops: migration to a cloud-native architecture
  publication-title: IEEE Software
  doi: 10.1109/MS.2016.64
– volume: 64
  start-page: 79
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-35
  article-title: How to transition incrementally to microservice architecture
  publication-title: Communications of the ACM
  doi: 10.1145/3378064
– volume: 31
  start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-228
  article-title: A six-layer architecture for the digital twin: a manufacturing case study implementation
  publication-title: Journal of Intelligent Manufacturing
  doi: 10.1007/s10845-019-01516-6
– volume: 35
  start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-161
  article-title: Requirements for a model-driven cloud-native migration of monolithic web-based applications
  publication-title: SICS Software-Intensive Cyber-Physical Systems
  doi: 10.1007/s00450-019-00414-9
– volume: 24
  start-page: 25
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-297
  article-title: State of the art and research challenges in the security technologies of network function virtualization
  publication-title: IEEE Internet Computing
  doi: 10.1109/MIC.2019.2956712
– start-page: 47
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-43
  article-title: Basic principles of osmotic computing: secure and dependable microelements (mels) orchestration leveraging blockchain facilities
– start-page: 67
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-255
  article-title: The hidden cost of backward compatibility: when deprecation turns into technical debt-an experience report
– start-page: 60
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-98
  article-title: Using attack injection to evaluate intrusion detection effectiveness in container-based systems
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-73
  article-title: A method for architectural trade-off analysis based on patterns: evaluating microservices structural attributes
– volume: 22
  start-page: 661
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-140
  article-title: SD-CPS: software-defined cyber-physical systems. taming the challenges of CPS with workflows at the edge
  publication-title: Cluster Computing
  doi: 10.1007/s10586-018-2874-8
– volume: 159
  start-page: 372
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-1
  article-title: A web service security governance approach based on dedicated micro-services
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2019.09.192
– volume: 97
  start-page: 101967
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-148
  article-title: Modeling continuous security: a conceptual model for automated devsecops using open-source software over cloud (adoc)
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.101967
– start-page: 205
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-17
  article-title: A continuous certification methodology for devops
– volume: 7
  start-page: 277
  issue: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-236
  article-title: Microservices API security
  publication-title: International Journal of Engineering Research & Technology
  doi: 10.1088/1742-6596/1175/1/012101
– volume: 24
  start-page: 1061
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-240
  article-title: An empirical study of architecting for continuous delivery and deployment
  publication-title: Empirical Software Engineering
  doi: 10.1007/s10664-018-9651-4
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-252
  article-title: Interface quality patterns: Communicating and improving the quality of microservices Apis
– start-page: 44
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-12
  article-title: A systematic mapping study in microservice architecture
– volume: 43
  start-page: 7719
  issue: 12
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-192
  article-title: What do software practitioners really think about software process improvement project success? An exploratory study
  publication-title: Arabian Journal for Science and Engineering
  doi: 10.1007/s13369-018-3140-3
– volume: 19
  start-page: 3292
  issue: 15
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-70
  article-title: DNS/DANE collision-based distributed and dynamic authentication for microservices in IoT
  publication-title: Sensors
  doi: 10.3390/s19153292
– start-page: 467
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-89
  article-title: Catalyzer: sub-millisecond startup for serverless computing with initialization-less booting
– year: 2021
  ident: 10.7717/peerj-cs.779/ref-216
  article-title: Smells and refactorings for microservices security: a multivocal literature review
  publication-title: ArXiv
– start-page: 646
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-105
  article-title: Multilayer technique to secure data transfer in private cloud for saas applications
– start-page: 68
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-5
  article-title: Requirements reconciliation for scalable and secure microservice (de) composition
– volume: 49
  start-page: 1448
  issue: 10
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-133
  article-title: Straddling the crevasse: a review of microservice software architecture foundations and recent advancements
  publication-title: Software: Practice and Experience
  doi: 10.1002/spe.2729
– volume: 11
  start-page: 127
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-72
  article-title: Cyber-storms come from clouds: security of cloud computing in the iot era
  publication-title: Future Internet
  doi: 10.3390/fi11060127
– start-page: 1235
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-121
  article-title: Attack graph generation for microservice architecture
– volume: 53
  start-page: 1
  issue: 4
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-10
  article-title: Foundations, properties, and security applications of puzzles: a survey
  publication-title: ACM Computing Surveys (CSUR)
  doi: 10.1145/3396374
– start-page: 1175
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-298
  article-title: Effective and efficient privacy threat modeling through domain refinements
– volume: 18
  start-page: 1
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-128
  article-title: Iotef: a federated edge-cloud architecture for fault-tolerant iot applications
  publication-title: Journal of Grid Computing
  doi: 10.1007/s10723-019-09498-8
– volume: 15
  start-page: 35
  issue: 6
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-238
  article-title: Monitoring in a devops world
  publication-title: Queue
  doi: 10.1145/3178368.3178371
– volume: 14
  start-page: 1
  issue: 3–4
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-16
  article-title: Democratizing authority in the built environment
  publication-title: ACM Transactions on Sensor Networks (TOSN)
  doi: 10.1145/3199665
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-68
  article-title: A microservices architecture for ads-b data security using blockchain
– volume: 98
  start-page: 289
  issue: 2011
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-307
  article-title: All one needs to know about fog computing and related edge computing paradigms: a complete survey
  publication-title: Journal of Systems Architecture
  doi: 10.1016/j.sysarc.2019.02.009
– volume: 16
  start-page: 381
  issue: 3
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-237
  article-title: Indigo-datacloud: a platform to facilitate seamless access to e-infrastructures
  publication-title: Journal of Grid Computing
  doi: 10.1007/s10723-018-9453-3
– volume: 155
  start-page: 252
  issue: 5
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-9
  article-title: Secure multi-cloud virtual network embedding
  publication-title: Computer Communications
  doi: 10.1016/j.comcom.2020.03.023
– volume: 33
  start-page: e6093
  issue: 19
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-79
  article-title: Cloud apps to-go: cloud portability with TOSCA and MiCADO
  publication-title: Concurrency and Computation: Practice and Experience
  doi: 10.1002/cpe.6093
– volume: 2
  start-page: 123
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-177
  article-title: Identifying availability tactics to support security architectural design of microservice-based systems
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-207
  article-title: Graph-based iot microservice security
– start-page: 573
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-6
  article-title: Integrity protection against insiders in microservice-based infrastructures: from threats to a security framework
– start-page: 712
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-78
  article-title: Dedos: defusing dos with dispersion oriented software
– volume: 102
  start-page: 103305
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-231
  article-title: Microservice chatbot architecture for chronic patient support
  publication-title: Journal of Biomedical Informatics
  doi: 10.1016/j.jbi.2019.103305
– start-page: 302
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-51
  article-title: On isolation-driven automated module decomposition
– volume: 30
  start-page: e2132
  issue: 6
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-184
  article-title: Next generation of microservices for the 5g service-based architecture
  publication-title: International Journal of Network Management
  doi: 10.1002/nem.2132
– start-page: 171
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-268
  article-title: Integrating continuous security assessments in microservices and cloud native applications
– start-page: 21
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-83
  article-title: Research on architecting microservices: trends, focus, and potential for industrial adoption
– volume: 159
  start-page: 1035
  issue: 3–4
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-20
  article-title: Dynamic microservices to create scalable and fault tolerance architecture
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2019.09.271
– volume: 8
  start-page: 43413
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-55
  article-title: A framework of virtual war room and matrix sketch-based streaming anomaly detection for microservice systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2977464
– start-page: 278
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-222
  article-title: Custos: security middleware for science gateways
– volume-title: Risk centric threat modeling
  year: 2015
  ident: 10.7717/peerj-cs.779/ref-278
  doi: 10.1002/9781118988374
– start-page: 1
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-27
  article-title: Challenges for scaling applications across enclaves
– volume-title: Information security handbook: develop a threat model and incident response strategy to build a strong information security framework
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-76
– volume: 8
  start-page: 100048
  issue: August
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-71
  article-title: Security challenges to smart agriculture: current state, key issues, and future directions
  publication-title: Array
  doi: 10.1016/j.array.2020.100048
– start-page: 63
  year: 2015
  ident: 10.7717/peerj-cs.779/ref-221
  article-title: Authorization federation in iaas multi cloud
– volume: 1
  start-page: e12080
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-266
  article-title: Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches
  publication-title: Engineering Reports
  doi: 10.1002/eng2.12080
– volume: 114
  start-page: 217
  issue: 8
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-169
  article-title: Devops in practice: a multiple case study of five companies
  publication-title: Information and Software Technology
  doi: 10.1016/j.infsof.2019.06.010
– start-page: 505
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-153
  article-title: Platform teams: an organizational structure for continuous delivery
– volume: 35
  start-page: 77
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-47
  article-title: Radon: rational decomposition and orchestration for serverless computing
  publication-title: SICS Software-Intensive Cyber-Physical Systems
  doi: 10.1007/s00450-019-00413-w
– volume-title: The eu general data protection regulation (gdpr): a practical guide
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-286
  doi: 10.1007/978-3-319-57959-7
– start-page: 1169
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-242
  article-title: Research on unified authentication and authorization in microservice architecture
– start-page: 195
  volume-title: Microservices: yesterday, today, and tomorrow
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-88
– volume: 52
  start-page: 331
  issue: 5
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-95
  article-title: Design of virtual engineering and digital twin platform as implementation of cyber-physical systems
  publication-title: Procedia Manufacturing
  doi: 10.1016/j.promfg.2020.11.055
– start-page: 101
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-196
  article-title: I-safe: instant suspicious activity identification at the edge using fuzzy decision making
– year: 2018
  ident: 10.7717/peerj-cs.779/ref-304
  article-title: Exploring microservice security
– start-page: 492
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-291
  article-title: Cloudranger: root cause identification for cloud native systems
– start-page: 427
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-137
  article-title: Protected coordination of service mesh for container-based 3-tier service traffic
– volume: 63
  start-page: 58
  issue: 5
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-229
  article-title: Beyond the ‘fix-it’ treadmill
  publication-title: Communications of the ACM
  doi: 10.1145/3380322
– start-page: 21
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-202
  article-title: Seconetbench: a modular framework for secure container networking benchmarks
– start-page: 122
  year: 2019a
  ident: 10.7717/peerj-cs.779/ref-158
  article-title: Service mesh: challenges, state of the art, and future research opportunities
– volume: 102
  start-page: 105
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-150
  article-title: Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks
  publication-title: Computing
  doi: 10.1007/s00607-019-00733-4
– volume: 51
  start-page: 44
  issue: 7
  year: 2013
  ident: 10.7717/peerj-cs.779/ref-212
  article-title: Mobileflow: toward software-defined mobile networks
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2013.6553677
– volume: 9
  start-page: 58
  issue: 4
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-218
  article-title: Access control with delegated authorization policy evaluation for data-driven microservice workflows
  publication-title: Future Internet
  doi: 10.3390/fi9040058
– start-page: 31
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-256
  article-title: Can container fusion be securely achieved?
– volume: 31
  start-page: e4436
  issue: 22
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-308
  article-title: A survey on security issues in services communication of microservices-enabled fog applications
  publication-title: Concurrency and Computation: Practice and Experience
  doi: 10.1002/cpe.4436
– start-page: 1
  year: 2015
  ident: 10.7717/peerj-cs.779/ref-262
  article-title: Swiss tso integrated operational planning, optimization and ancillary services system
– start-page: 1108
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-26
  article-title: Privaaas: privacy approach for a distributed cloud-based data analytics platforms
– start-page: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-214
  article-title: Soa approach-identity and access management for the risk management platform
– start-page: 181
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-63
  article-title: Tapis api development with python: best practices in scientific rest api implementation: experience implementing a distributed stream api
– year: 2012
  ident: 10.7717/peerj-cs.779/ref-234
  publication-title: Case Study Research in Software Engineering-Guidelines and Examples
  doi: 10.1002/9781118181034
– volume: 19
  start-page: 1
  issue: 2
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-220
  article-title: Fog computing for the internet of things: a survey
  publication-title: ACM Transactions on Internet Technology
  doi: 10.1145/3301443
– start-page: 23:1
  volume-title: Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, BuildSys 2017
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-15
  article-title: Old democratizing authority in the built environment
– start-page: 423
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-197
  article-title: Development activities, tools and techniques of secure microservices compositions
– volume: 50
  start-page: 757
  issue: 5
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-147
  article-title: SDN/NFV security framework for fog-to-things computing infrastructure
  publication-title: Software: Practice and Experience
  doi: 10.1002/spe.2761
– volume: 52
  start-page: 102008
  issue: 9
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-42
  article-title: A blockchain use case in food distribution: do you know where your food has been?
  publication-title: International Journal of Information Management
  doi: 10.1016/j.ijinfomgt.2019.09.004
– start-page: 31
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-19
  article-title: Microservices made attack-resilient using unsupervised service fissioning
– year: 2020
  ident: 10.7717/peerj-cs.779/ref-77
  article-title: Smart cyber-physical systems: toward pervasive intelligence systems
  doi: 10.1016/j.future.2019.06.031
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-162
  article-title: Devops in an iso 13485 regulated environment: a multivocal literature review
– start-page: 61
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-103
  article-title: Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures
– volume: 79
  start-page: 849
  issue: 6
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-283
  article-title: Next generation cloud computing: new trends and research directions
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2017.09.020
– volume: 2018
  start-page: 1
  issue: 7
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-273
  article-title: Survey of authentication and authorization for the internet of things
  publication-title: Security and Communication Networks
  doi: 10.1155/2018/4351603
– start-page: 148
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-39
  article-title: Droidautoml: a microservice architecture to automate the evaluation of android machine learning detection systems
– start-page: 1180
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-24
  article-title: Authentication and authorization orchestrator for microservice-based software architectures
– volume: 31
  start-page: 695
  issue: 3
  year: 2019b
  ident: 10.7717/peerj-cs.779/ref-159
  article-title: Exploring new opportunities to defeat low-rate ddos attack in container-based cloud environment
  publication-title: IEEE Transactions on Parallel and Distributed Systems
  doi: 10.1109/TPDS.2019.2942591
– volume: 51
  start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-164
  article-title: Cyber intrusion detection through association rule mining on multi-source logs
  publication-title: Applied Intelligence
  doi: 10.1007/s10489-020-02007-5
– volume: 9
  start-page: 100150
  issue: 3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-276
  article-title: Devops contract for assuring execution of iot microservices in the edge
  publication-title: Internet of Things
  doi: 10.1016/j.iot.2019.100150
– start-page: 199
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-11
  article-title: Survey on microservice architecture-security, privacy and standardization on cloud computing environment
– volume: 55
  start-page: 102
  issue: 9
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-93
  article-title: Security and privacy for cloud-based data management in the health network service chain: a microservice approach
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2017.1700089
– volume: 351
  start-page: 115
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-14
  article-title: Correct audit logging in concurrent systems
  publication-title: Electronic Notes in Theoretical Computer Science
  doi: 10.1016/j.entcs.2020.08.007
– volume: 170
  start-page: 105251
  issue: 1–3
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-113
  article-title: A secure fish farm platform based on blockchain for agriculture data integrity
  publication-title: Computers and Electronics in Agriculture
  doi: 10.1016/j.compag.2020.105251
– start-page: 31
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-264
  article-title: Embedding security and privacy into the development and operation of cloud applications and services
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-263
  article-title: Recommendations for enhancing security in microservice environment altered in an intelligent way
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-108
  article-title: Identity and access control for micro-services based 5g nfv platforms
– volume: 42
  start-page: 182
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-81
  article-title: Blockchain support for collaborative business processes
  publication-title: Informatik Spektrum
  doi: 10.1007/s00287-019-01178-x
– volume: 56
  start-page: 157
  issue: 2
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-116
  article-title: Decentralized cloud manufacturing-as-a-service (cmaas) platform architecture with configurable digital assets
  publication-title: Journal of Manufacturing Systems
  doi: 10.1016/j.jmsy.2020.05.017
– volume: 21
  start-page: 42
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-190
  article-title: Securing microservices
  publication-title: IT Professional
  doi: 10.1109/MITP.2018.2876987
– start-page: 285
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-189
  article-title: Fine-grained access control for microservices
– start-page: 13
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-299
  article-title: A cloud robotic application platform design based on the microservices architecture
– volume-title: Anti-fragile ICT systems
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-119
  doi: 10.1007/978-3-319-30070-2
– volume-title: Securing DevOps: security in the cloud
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-285
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-259
  article-title: A reference architecture for the container ecosystem
– volume: 52
  start-page: 1
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-154
  article-title: A survey of devops concepts and challenges
  publication-title: ACM Computing Surveys (CSUR)
  doi: 10.1145/3359981
– volume: 14
  start-page: 907
  issue: 8
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-303
  article-title: Microshare: privacy-preserved medical resource sharing through microservice architecture
  publication-title: International Journal of Biological Sciences
  doi: 10.7150/ijbs.24617
– volume: 150
  start-page: 77
  issue: 1
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-82
  article-title: Architecting with microservices: a systematic mapping study
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2019.01.001
– volume: 7
  start-page: 307
  issue: 1
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-123
  article-title: A classification and characterization of security threats in cloud computing
  publication-title: International Journal of Next-Generation Computing
  doi: 10.47164/ijngc.v7i1.307
– start-page: 262
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-223
  article-title: Synaptic: secure and persistent connectivity for containers
– volume: 78
  start-page: 33837
  issue: 23
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-58
  article-title: A cloud compatible dna coded security solution for multimedia file sharing & storage
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-019-08166-z
– volume: 72
  start-page: 1
  issue: 1–2
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-172
  article-title: Ciotas protocol: cloudiot available services protocol through autonomic computing against distributed denial of services attacks
  publication-title: Journal of Ambient Intelligence and Humanized Computing
  doi: 10.1007/s12652-020-02556-0
– volume: 1175
  start-page: 012101
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-244
  article-title: Lessons learned in applying reactive system in microservices
  publication-title: Journal of Physics: Conference Series
  doi: 10.1088/1742-6596/1175/1/012101
– start-page: 50
  year: 2015
  ident: 10.7717/peerj-cs.779/ref-254
  article-title: Security-as-a-service for microservices-based cloud applications
– volume: 78
  start-page: 3341
  issue: 3
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-217
  article-title: Gamifying cultural experiences across the urban environment
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-018-6513-4
– start-page: 1
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-208
  article-title: Towards secure cloud orchestration for multi-cloud deployments
– volume: 155
  start-page: 441
  issue: 9
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-260
  article-title: A cluster of CP-ABE microservices for vanet
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2019.08.061
– volume: 19
  start-page: 4798
  issue: 21
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-21
  article-title: Microservices suite for smart city applications
  publication-title: Sensors
  doi: 10.3390/s19214798
– start-page: 9
  year: 2017
  ident: 10.7717/peerj-cs.779/ref-165
  article-title: A secure microservice framework for IoT
– start-page: 30
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-109
  article-title: Challenges in adopting continuous delivery and devops in a globally distributed product team: a case study of a healthcare organization
– volume: 130
  start-page: 456
  issue: 2
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-125
  article-title: Defense-in-depth and role authentication for microservice systems
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2018.04.047
– start-page: 568
  year: 2019
  ident: 10.7717/peerj-cs.779/ref-187
  article-title: Coordinated dataflow protection for ultra-high bandwidth science networks
– start-page: 1224
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-199
  article-title: Generating highly-structured input data by combining search-based testing and grammar-based fuzzing
– start-page: 70
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-284
  article-title: Security challenges of small cell as a service in virtualized mobile edge computing environments
– start-page: 518
  year: 2016
  ident: 10.7717/peerj-cs.779/ref-50
  article-title: Survey on concern separation in service integration
– start-page: 7
  year: 2020
  ident: 10.7717/peerj-cs.779/ref-167
  article-title: Highly-distributed systems based on micro-services and their construction paradigms
– volume: 12
  start-page: 183
  issue: 3–4
  year: 2018
  ident: 10.7717/peerj-cs.779/ref-182
  article-title: A review and future directions of SOA-based software architecture modeling approaches for system of systems
  publication-title: Service Oriented Computing and Applications
  doi: 10.1007/s11761-018-0245-1
– volume: 84
  start-page: 523
  issue: 2
  year: 2010
  ident: 10.7717/peerj-cs.779/ref-281
  article-title: Software survey: vosviewer, a computer program for bibliometric mapping
  publication-title: Scientometrics
  doi: 10.1007/s11192-009-0146-3
SSID ssj0001511119
Score 2.3529053
Snippet Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between...
SourceID doaj
pubmedcentral
hal
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage e779
SubjectTerms Analysis
Computer networks
Computer Science
Correlation analysis
Data security
Datasets
Design
Distributed processing (Computers)
Emerging Technologies
Infrastructure
Infrastructure-as-a-service
Literature reviews
Methods
Network security
Programming Languages
Security
Security and Privacy
Service composition
Service deployment
Service discovery
Software development
Software Engineering
Systematic review
Threat model
Web services
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9QwELVouXABylcDLQoViAOKmjjJxuZSbRHLgigHoFJvVjy2W1CVLJtdfj8zjjdLQHBMMkocezzzxh6_Yey5SycODIfEWNTgopA2kSUnQoBKQy64A7-Df_ZpMj8vPlyUF2HBrQtplRub6A21aYHWyI8R6U8qxCqCnyx-JFQ1inZXQwmNHXYzQ09DGi5m77ZrLCUZBNnnu1cYuBwvrF1-T6DDKznyRJ6wfzDLO1eUFfk35Pwzc_I3VzS7y24HDBlP-0HfYzdsc4_d2dRniMN0vc_KM8q263prEHehUt3ruI63_M3x9cCrHPfHWB6w89nbr2_mSSiTkAD64lVSc1_6p0xzm6VamywXFs0YQjEDZsJNxY0xGa-1MzzXBicphkDCOoxUSl4IyB-y3aZt7D6LAcGccBn-XyWKPAUcNon4gVeZBJASIvZq02UKAoc4lbK4VhhLUAcr38EKOrySEXsxSC967ox_yJ1S7w8yxHjtb7TLSxUmkEoNxgGllsJkrgALNUdgqNO8ztC7aucidkRjp4jToqGkmct63XXq_ZfPalql6IMxrsQvvQxCrsV2Qx3OIODfEw3WSPJgJImTDkaPj1BFRi2eTz8quucp9xE2_szwHRsNUsEydGqrxxF7Njym11O2W2PbNcnwEtUZrW_EHvUKN3yKNn4RxBURq0aqOGrL-Enz7crzhgvseZHmj__frCfsFqcjHrTMVB6w3dVybQ8ReK30Uz-7fgG8Mi40
  priority: 102
  providerName: ProQuest
Title Microservice security: a systematic literature review
URI https://www.ncbi.nlm.nih.gov/pubmed/35111904
https://www.proquest.com/docview/2616777482
https://www.proquest.com/docview/2625266073
https://inria.hal.science/hal-03915125
https://pubmed.ncbi.nlm.nih.gov/PMC8771803
https://doaj.org/article/0d7725b98d1f4ceca2059b03a1718bff
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3fb5RAEJ7Y-uKLv7W09YKNxgdDCgscu327Nj1PYxtTbdK3DTu7azUN15Q7__7OAEcPjfHFR9gJLMPszDcw-w3AGx-PPVqBkXVkwVmmXKRywYQAhcFUCo_NH_yT0_HsPPt0kV-stfrimrCWHrhV3H5sCf_lRkmb-AwdloIAgYnTMiGvarxn70sxby2ZavcHsytQbaV7QSnL_rVzNz8jrOlIDWJQQ9XfO-SNS66H_BNs_l4zuRaEpo_hYYcew0k76ydwz1VP4dGqM0PYLdRnkJ9wnV3d-oGw7nrUHYRleMfcHF71jMphu4HlOZxPj78dzaKuQUKEFIUXUSmapj95nLokNsYmqXTkwAiEWbRjYQthrU1EabwVqbG0PCn5kc5TjpKLTGL6AjareeW2IESCcdIn9HyFzNIY6YUpQg6iSBSiUhjA-5XKNHbs4dzE4kpTFsEK1o2CNdZ0pAJ420tft6wZf5E7ZO33Msx13ZwgC9CdBeh_WUAAe_zuNLNZVFwu871c1rX--PVMT4qYoi9llHSnd52Qn9O8sex2H9DTMwHWQHJ3IEnLDQfDe2QigxnPJp81n2vI9gkw_kroGisL0p1PqDXlquOC0LYUAbzuh_nyXOdWufmSZUROkIn8bgAvW4Prb8W_fAm-ZQEUA1MczGU4Uv24bBjDJWlexun2_1D3DjwQvAWEP0Plu7C5uFm6VwTMFmYEG3L6YQT3D49Pv5yNmhV5CwHAOZI
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB615QAX3g9DAVNRcUBW7bUd7yIhFB4hoUkP0Eq9be19tKDKDnEC4k_xG5nxKxgEtx5tj9br8Ty-2Z2dAXhq_YFVmilPG5TgKBLGEzGjggBJpkLOrKp28GcHg_FR9OE4Pt6An-1ZGEqrbG1iZah1oWiNfA-R_iBBrMLZq_lXj7pG0e5q20KjFot98-M7hmzly8lb_L-7jI3eHb4Ze01XAU-h61p6Kas65cR-aAI_y3QQcoNaj8hFKz1gOmFa64ClmdUszDTKNEYM3FgE9jGLuApx3E24FIWhoBRCPnq_XtOJyQCJOr8-wUBpb27M4ounSrwSPc9XNQjo3MDmGWVh_g1x_8zU_M31ja7D1QazusNayG7AhslvwrW2H4TbmIdbEM8ou6-srY9bNp3xXripu64X7Z53dZzd-tjMbTi6EAbega28yM09cBWCR24D_L6ER6GvUEwE4hWWBEIpIZQDz1uWSdXULKfWGecSYxdisKwYLFWJV8KB3Y56Xtfq-Afda-J-R0MVtqsbxeJUNgorfY1xR5wJrgMbKaNShkA088M0QG-eWevADv07STU0ckrSOU1XZSknnz7KYeKjz8c4Ft_0rCGyBc5bpc2ZB_x6KrvVo9zuUaKSq97jHRSR3ozHw6mke1WJf4Sp3wIco5Ug2ViiUq71xoEn3WManrLrclOsiIbFCNTQ2jtwtxa47lW00YygMXIg6Yliby79J_nns6pOOUfOcz-8__9pPYbL48PZVE4nB_sP4Aqj4yW0xBVvw9ZysTIPEfQts0eVprlwctGq_QsZkWnu
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Zb9NAEB61RUK8lBsMBUxFxQOyYq_teBcJoUAJCT2EgEp9W-w92qLKDnEC4q_x65jxFQyCtz7aHq3X4zm-2Z2dAXhi_aFVmilPG5TgKBLGEzGjggBJpkLOrKp28A8Oh5Oj6N1xfLwGP9uzMJRW2drEylDrQtEa-QCR_jBBrMLZwDZpEe93xy9nXz3qIEU7rW07jVpE9syP7xi-lS-mu_ivdxgbv_n0euI1HQY8hW5s4aWs6poT-6EJ_CzTQcgNWgBEMVrpIdMJ01oHLM2sZmGmUb4xeuDGIsiPWcRViOOuw6Uk5D51T-Djt6v1nZiMkahz7RMMmgYzY-ZfPFXileh5wapZQOcS1k8pI_NvuPtn1uZvbnB8DTYb_OqOaoG7DmsmvwFX294QbmMqbkJ8QJl-ZW2J3LLpkvfcTd1V7Wj3vKvp7NZHaG7B0YUw8DZs5EVu7oKrEEhyG-D3JTwKfYUiIxC7sCQQSgmhHHjWskyqpn45tdE4lxjHEINlxWCpSrwSDux01LO6bsc_6F4R9zsaqrZd3SjmJ7JRXulrjEHiTHAd2EgZlTIEpZkfpgF69sxaB7bp30mqp5GTZJ6ky7KU048f5Cjx0f9jTItvetoQ2QLnrdLm_AN-PZXg6lFu9ShR4VXv8TaKSG_Gk9G-pHtVuX-ErN8CHKOVINlYpVKudMiBx91jGp4y7XJTLImGxQja0PI7cKcWuO5VtOmMADJyIOmJYm8u_Sf52WlVs5wj57kf3vv_tB7BZVRquT893LsPVxidNKHVrngLNhbzpXmA-G-RPawUzYXPF63ZvwDcRW4b
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Microservice+security%3A+a+systematic+literature+review&rft.jtitle=PeerJ.+Computer+science&rft.au=Berardi%2C+Davide&rft.au=Giallorenzo%2C+Saverio&rft.au=Mauro%2C+Jacopo&rft.au=Melis%2C+Andrea&rft.date=2022-01-05&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=8&rft.spage=e779&rft_id=info:doi/10.7717%2Fpeerj-cs.779&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon