2,060 Hits in 4.7 sec

Security Concerns regarding Software Development Migrations in Quantum Computing Context

Andreea-Alina Cornea, Alexandru Marius Obretin
2022 SAR Journal  
layer to increase protection for the modern software architectural style represented by microservices and which has become the favourite development alternative of the last years.  ...  developed during 2000s, to microservices and increased security ecosystems, as an indisputable requirement.  ...  In the process of migrating an application from monolith to a modern architecture, some essential aspects, as security, should be taken into consideration.  ... 
doi:10.18421/sar51-02 doaj:ff3faf066e874684bb75eadc98bc0d70 fatcat:yr4luvpwijfebnwr5w6q23wp5y

A Systematic Mapping Study in Microservice Architecture

Nuha Alshuqayran, Nour Ali, Roger Evans
2016 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA)  
As microservice architecture is a new research area, the need for a systematic mapping study is crucial in order to summarise the progress so far and identify the gaps and requirements for future studies  ...  In this paper we present a systematic mapping study of microservices architectures and their implementation.  ...  [34] Conference 16 Microservices architecture based cloudware deployment platform for service computing [12] Conference 17 Security-as-a-Service for microservices-based cloud applications[39] Conference  ... 
doi:10.1109/soca.2016.15 dblp:conf/soca/AlshuqayranAE16 fatcat:kswck7z4hfaotorxnib4koi3b4

Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices [article]

Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl
2022 arXiv   pre-print
However, securing such architectures is a challenging task since traditional security concepts cannot be directly applied to microservice architectures due to their distributed nature.  ...  For this, we conducted a systematic GL study on the challenges and best practices of microservice security present in the Internet with the goal of capturing relevant discussions in blogs, white papers  ...  Therefore, there is a need for frameworks and best practices that take security into consideration from the early stages of microservices' life cycle.  ... 
arXiv:2202.01612v1 fatcat:kuht4r52ffcobfqaeiq6e7smkq

CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices

Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris
2020 Ad hoc networks  
For the in-depth quantitative evaluation, we treat multiple distributions of users' populations and assess the proposed architecture against other similar microservices.  ...  The microservices architectural approach has important benefits regarding the agile applications' development and the delivery of complex solutions.  ...  ACKNOWLEGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and feedback which was extremely helpful in improving the quality of the paper.  ... 
doi:10.1016/j.adhoc.2020.102153 fatcat:wsekvv4isbb6hpynq6i355se2a

Overcoming Security Challenges in Microservice Architectures

Tetiana Yarygina, Anya Helene Bagge
2018 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)  
A natural progression of this work is to propose an architectural style that incorporates basic security principles.  ...  Future Research Inoue et. al. [53] introduced an architectural style called RESTUS, which incorporates session state at the server-side as an additional constraint.  ...  However, the core security principles hold for microservices as well as for any other architecture.  ... 
doi:10.1109/sose.2018.00011 dblp:conf/sose/YaryginaB18 fatcat:54wjuoxxhff2tlldyvowt2p2em

Microservices - A Catalyzer for Better Managing Healthcare Data Empowerment

2020 Studies in Informatics and Control  
microservices architecture are discussed.  ...  In order to address the deployment of a suitable and efficient architecture for a remote healthcare monitoring system, several aspects of the monolithic architecture and Service-Oriented Architecture versus  ...  Microservices -A Catalyzer for Better Managing Healthcare Data Empowerment  ... 
doi:10.24846/v29i2y202008 fatcat:kotazeql2bafxl3rlwg4ndquta

Securing Microservices and Microservice Architectures: A Systematic Mapping Study [article]

Abdelhakim Hannousse, Salima Yahiouche
2020 arXiv   pre-print
A growing body of literature is found addressing security threats and security mechanisms to individual microservices and microservice architectures.  ...  Microservice architectures (MSA) are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications.  ...  What domains or platforms are the focus of existing solutions for securing microservices and microservice architectures?  ... 
arXiv:2003.07262v2 fatcat:6mhrwnq655cehpraosqw4znhfi

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions [article]

Maha Driss, Daniah Hasan, Wadii Boulila, Jawad Ahmad
2021 arXiv   pre-print
In this paper, we aim to provide a survey about microservices-based approaches for securing IoT applications.  ...  To face this problem, several recent works have been conducted using microservices-based architecture to minimize the security threats and attacks related to IoT data.  ...  considerations to implement security by design approach [37] .  ... 
arXiv:2105.07722v1 fatcat:6zvz4sx3rba3nfhzkyg7j2bijm

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules

Safa Habibullah, School of Computing, Edinburgh Napier University, Edinburgh, UK, Xiaodong Liu, Zhiyuan Tan
2018 Journal of clean energy technologies  
To cope with these technical challenges, a new approach is proposed in this paper to govern the evolution of legacy systems into a microservice-based and cloud-hosted architecture.  ...  Challenges, relating to information security, container optimisation, the performance of a new system and its deployment, are particularly under concern.  ...  Another systematic mapping study shows that some of the qualities of attributes have not be thoroughly investigated, such as security features for microservice architecture [2] .  ... 
doi:10.7763/ijcte.2018.v10.1219 fatcat:fk52esbrarezpe24kxipnk3dey

Blockchain Methods for Trusted Avionics Systems [article]

Erik Blasch, Ronghua Xu, Yu Chen, Genshe Chen, Dan Shen
2019 arXiv   pre-print
Blockchain is a popular method to ensure security for trusted systems.  ...  chain of security blocks.  ...  Blockchain microservices could be a solution for ADS-B security. III.  ... 
arXiv:1910.10638v1 fatcat:nazb556q7zexrmxadt3tedrrii

Microservice Architecture Reconstruction and Visualization Techniques: A Review [article]

Tomas Cerny, Amr S. Abdelfattah, Vincent Bushong, Abdullah Al Maruf, Davide Taibi
2022 arXiv   pre-print
To begin testing the feasibility of deriving such perspectives from microservice systems, we developed and implemented prototype tools for software architecture reconstruction and visualization of compared  ...  In this work, we explored microservice-specific architecture reconstruction based on static analysis.  ...  This partially overlaps with the domain view by [2] but is more broad considering data flow. • Security view is an overview of the security schemes and points within the architecture that security is  ... 
arXiv:2207.02988v2 fatcat:l4onzoatcnfjxd7jihsrbvboeu

Microservices: Architecture and Technologies

Vishva Desai
2020 International Journal for Research in Applied Science and Engineering Technology  
These requirements can be satisfied by microservices architecture. A microservices framework consisting of microservices and containers delivers a diverse and distributed application.  ...  In a monolithic architecture, it becomes difficult to manage the structure of code. This is made manageable by adopting microservice architecture.  ...  Service mesh is used for secure inter-communication between different microservices in a distributed application.  ... 
doi:10.22214/ijraset.2020.31979 fatcat:ahvmpplm4ffrhbymcwm2r6fz44

Microservices: yesterday, today, and tomorrow [article]

Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch Lafuente, Manuel Mazzara, Fabrizio Montesi, Ruslan Mustafin, Larisa Safina
2017 arXiv   pre-print
Microservices is an architectural style inspired by service-oriented computing that has recently started gaining popularity.  ...  Before presenting the current state-of-the-art in the field, this chapter reviews the history of software architecture, the reasons that led to the diffusion of objects and services first, and microservices  ...  Acknowledgements Montesi was supported by CRC (Choreographies for Reliable and efficient Communication software), grant no. DFF-4005-00304 from the Danish Council for Independent Research.  ... 
arXiv:1606.04036v4 fatcat:dieucbbd5rbjjezafvrozuuj6i

Microservice Security Metrics for Secure Communication, Identity Management, and Observability

Uwe Zdun, Pierre-Jean Queval, Georg Simhandl, Riccardo Scandariato, Somik Chakravarty, Marjan Jelic, Aleksandar Jovanovic
2022 ACM Transactions on Software Engineering and Methodology  
Despite many guidelines and best practices being published, architecting microservice systems for security is challenging.  ...  Microservice architectures are increasingly being used to develop application systems.  ...  We thank the two experts Gergely Eberhardt and Ákos Milánkovich from SEARCH-LAB for their review of our models, metrics, and code, and work on the integration with the continuous certiication scheme explained  ... 
doi:10.1145/3532183 fatcat:2fijdvt47rfq3agtzjx3va5w4e

Legacy Digital Transformation: TCO and ROI Analysis

Ravi Kiran Mallidi, Manmohan Sharma, Jagjit Singh
2021 International journal of electrical and computer engineering systems  
The paper also includes a TCO-ROI calculator for Transformation from Legacy / Monolithic to new architectures like Microservices.  ...  EOL impacts application production, supportability, compliance, and security.  ...  Below are the challenges considerations while modernizing the applications Good architecture, design and coding, vendor-neutral, maintain open standards, and security compliance with measurable KPIs are  ... 
doi:10.32985/ijeces.12.3.5 fatcat:lit4qx55nbfwdcc4nrsjvvwinq
« Previous Showing results 1 — 15 out of 2,060 results