A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Concerns regarding Software Development Migrations in Quantum Computing Context
2022
SAR Journal
layer to increase protection for the modern software architectural style represented by microservices and which has become the favourite development alternative of the last years. ...
developed during 2000s, to microservices and increased security ecosystems, as an indisputable requirement. ...
In the process of migrating an application from monolith to a modern architecture, some essential aspects, as security, should be taken into consideration. ...
doi:10.18421/sar51-02
doaj:ff3faf066e874684bb75eadc98bc0d70
fatcat:yr4luvpwijfebnwr5w6q23wp5y
A Systematic Mapping Study in Microservice Architecture
2016
2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA)
As microservice architecture is a new research area, the need for a systematic mapping study is crucial in order to summarise the progress so far and identify the gaps and requirements for future studies ...
In this paper we present a systematic mapping study of microservices architectures and their implementation. ...
[34]
Conference
16
Microservices architecture based cloudware deployment platform for service computing [12]
Conference
17
Security-as-a-Service for microservices-based cloud applications[39]
Conference ...
doi:10.1109/soca.2016.15
dblp:conf/soca/AlshuqayranAE16
fatcat:kswck7z4hfaotorxnib4koi3b4
Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices
[article]
2022
arXiv
pre-print
However, securing such architectures is a challenging task since traditional security concepts cannot be directly applied to microservice architectures due to their distributed nature. ...
For this, we conducted a systematic GL study on the challenges and best practices of microservice security present in the Internet with the goal of capturing relevant discussions in blogs, white papers ...
Therefore, there is a need for frameworks and best practices that take security into consideration from the early stages of microservices' life cycle. ...
arXiv:2202.01612v1
fatcat:kuht4r52ffcobfqaeiq6e7smkq
CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices
2020
Ad hoc networks
For the in-depth quantitative evaluation, we treat multiple distributions of users' populations and assess the proposed architecture against other similar microservices. ...
The microservices architectural approach has important benefits regarding the agile applications' development and the delivery of complex solutions. ...
ACKNOWLEGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and feedback which was extremely helpful in improving the quality of the paper. ...
doi:10.1016/j.adhoc.2020.102153
fatcat:wsekvv4isbb6hpynq6i355se2a
Overcoming Security Challenges in Microservice Architectures
2018
2018 IEEE Symposium on Service-Oriented System Engineering (SOSE)
A natural progression of this work is to propose an architectural style that incorporates basic security principles. ...
Future Research Inoue et. al. [53] introduced an architectural style called RESTUS, which incorporates session state at the server-side as an additional constraint. ...
However, the core security principles hold for microservices as well as for any other architecture. ...
doi:10.1109/sose.2018.00011
dblp:conf/sose/YaryginaB18
fatcat:54wjuoxxhff2tlldyvowt2p2em
Microservices - A Catalyzer for Better Managing Healthcare Data Empowerment
2020
Studies in Informatics and Control
microservices architecture are discussed. ...
In order to address the deployment of a suitable and efficient architecture for a remote healthcare monitoring system, several aspects of the monolithic architecture and Service-Oriented Architecture versus ...
Microservices -A Catalyzer for Better Managing Healthcare Data Empowerment ...
doi:10.24846/v29i2y202008
fatcat:kotazeql2bafxl3rlwg4ndquta
Securing Microservices and Microservice Architectures: A Systematic Mapping Study
[article]
2020
arXiv
pre-print
A growing body of literature is found addressing security threats and security mechanisms to individual microservices and microservice architectures. ...
Microservice architectures (MSA) are becoming trending alternatives to existing software development paradigms notably for developing complex and distributed applications. ...
What domains or platforms are the focus of existing solutions for securing microservices and microservice architectures? ...
arXiv:2003.07262v2
fatcat:6mhrwnq655cehpraosqw4znhfi
Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions
[article]
2021
arXiv
pre-print
In this paper, we aim to provide a survey about microservices-based approaches for securing IoT applications. ...
To face this problem, several recent works have been conducted using microservices-based architecture to minimize the security threats and attacks related to IoT data. ...
considerations to implement security by design approach [37] . ...
arXiv:2105.07722v1
fatcat:6zvz4sx3rba3nfhzkyg7j2bijm
An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules
2018
Journal of clean energy technologies
To cope with these technical challenges, a new approach is proposed in this paper to govern the evolution of legacy systems into a microservice-based and cloud-hosted architecture. ...
Challenges, relating to information security, container optimisation, the performance of a new system and its deployment, are particularly under concern. ...
Another systematic mapping study shows that some of the qualities of attributes have not be thoroughly investigated, such as security features for microservice architecture [2] . ...
doi:10.7763/ijcte.2018.v10.1219
fatcat:fk52esbrarezpe24kxipnk3dey
Blockchain Methods for Trusted Avionics Systems
[article]
2019
arXiv
pre-print
Blockchain is a popular method to ensure security for trusted systems. ...
chain of security blocks. ...
Blockchain microservices could be a solution for ADS-B security.
III. ...
arXiv:1910.10638v1
fatcat:nazb556q7zexrmxadt3tedrrii
Microservice Architecture Reconstruction and Visualization Techniques: A Review
[article]
2022
arXiv
pre-print
To begin testing the feasibility of deriving such perspectives from microservice systems, we developed and implemented prototype tools for software architecture reconstruction and visualization of compared ...
In this work, we explored microservice-specific architecture reconstruction based on static analysis. ...
This partially overlaps with the domain view by [2] but is more broad considering data flow. • Security view is an overview of the security schemes and points within the architecture that security is ...
arXiv:2207.02988v2
fatcat:l4onzoatcnfjxd7jihsrbvboeu
Microservices: Architecture and Technologies
2020
International Journal for Research in Applied Science and Engineering Technology
These requirements can be satisfied by microservices architecture. A microservices framework consisting of microservices and containers delivers a diverse and distributed application. ...
In a monolithic architecture, it becomes difficult to manage the structure of code. This is made manageable by adopting microservice architecture. ...
Service mesh is used for secure inter-communication between different microservices in a distributed application. ...
doi:10.22214/ijraset.2020.31979
fatcat:ahvmpplm4ffrhbymcwm2r6fz44
Microservices: yesterday, today, and tomorrow
[article]
2017
arXiv
pre-print
Microservices is an architectural style inspired by service-oriented computing that has recently started gaining popularity. ...
Before presenting the current state-of-the-art in the field, this chapter reviews the history of software architecture, the reasons that led to the diffusion of objects and services first, and microservices ...
Acknowledgements Montesi was supported by CRC (Choreographies for Reliable and efficient Communication software), grant no. DFF-4005-00304 from the Danish Council for Independent Research. ...
arXiv:1606.04036v4
fatcat:dieucbbd5rbjjezafvrozuuj6i
Microservice Security Metrics for Secure Communication, Identity Management, and Observability
2022
ACM Transactions on Software Engineering and Methodology
Despite many guidelines and best practices being published, architecting microservice systems for security is challenging. ...
Microservice architectures are increasingly being used to develop application systems. ...
We thank the two experts Gergely Eberhardt and Ákos Milánkovich from SEARCH-LAB for their review of our models, metrics, and code, and work on the integration with the continuous certiication scheme explained ...
doi:10.1145/3532183
fatcat:2fijdvt47rfq3agtzjx3va5w4e
Legacy Digital Transformation: TCO and ROI Analysis
2021
International journal of electrical and computer engineering systems
The paper also includes a TCO-ROI calculator for Transformation from Legacy / Monolithic to new architectures like Microservices. ...
EOL impacts application production, supportability, compliance, and security. ...
Below are the challenges considerations while modernizing the applications Good architecture, design and coding, vendor-neutral, maintain open standards, and security compliance with measurable KPIs are ...
doi:10.32985/ijeces.12.3.5
fatcat:lit4qx55nbfwdcc4nrsjvvwinq
« Previous
Showing results 1 — 15 out of 2,060 results