{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:33:49Z","timestamp":1726036429665},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":27,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1016\/j.procs.2021.01.320","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T02:08:37Z","timestamp":1614046117000},"page":"1225-1236","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":42,"special_numbering":"C","title":["Security in Microservices Architectures"],"prefix":"10.1016","volume":"181","author":[{"given":"Nuno","family":"Mateus-Coelho","sequence":"first","affiliation":[]},{"given":"Manuela","family":"Cruz-Cunha","sequence":"additional","affiliation":[]},{"given":"Luis Gonzaga","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2021.01.320_bib1","doi-asserted-by":"crossref","unstructured":"Roberts, M., Udernani, R., Newman, S., Sharif, A., Baird, A., Buliani, S., Nagrani, V., Nair, A., Sun, Y., Nanda, S., Jaeger, T., Walker, D., Nadareishvili, I., Schneier, B., Dinh, K., Rajagopalan, R., Johnston, P., Pata, M., Pance, M., \u2026 Fowler, M. (2016). Rethinking Application Security With Microservices Architectures. In IEEE (Ed.), Software Architecture (WICSA), 2014 IEEE\/IFIP Conference (Vol. 1, pp. 50\u201357). O\u2019Reilly Media. https:\/\/doi.org\/10.1109\/CloudCom.2015.93","DOI":"10.1109\/CloudCom.2015.93"},{"key":"10.1016\/j.procs.2021.01.320_bib2","doi-asserted-by":"crossref","unstructured":"L. Chen and M. A. Babar, \u201cTowards an Evidence-Based Understanding of Emergence of Architecture through Continuous Refactoring in Agile Software Development,\u201d 2014 IEEE\/IFIP Conference on Software Architecture, Sydney, NSW, 2014, pp. 195-204, doi: 10.1109\/WICSA.2014.45.","DOI":"10.1109\/WICSA.2014.45"},{"key":"10.1016\/j.procs.2021.01.320_bib3","doi-asserted-by":"crossref","unstructured":"Bennett, K. H., & Rajlich, V. T. (2000). Software maintenance and evolution. Proceedings of the Conference on The Future of Software Engineering - ICSE \u201800. doi:10.1145\/336512.336534","DOI":"10.1145\/336512.336534"},{"key":"10.1016\/j.procs.2021.01.320_bib4","doi-asserted-by":"crossref","unstructured":"Puripunpinyo, H., & Samadzadeh, M. (2017). Effect of optimizing Java deployment artifacts on AWS Lambda. 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). doi:10.1109\/infcomw.2017.8116416","DOI":"10.1109\/INFCOMW.2017.8116416"},{"key":"10.1016\/j.procs.2021.01.320_bib5","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-319-67425-4_12","article-title":"Microservices: Yesterday, Today, and Tomorrow","author":"Dragoni","year":"2017","journal-title":"Present and Ulterior Software Engineering"},{"key":"10.1016\/j.procs.2021.01.320_bib6","doi-asserted-by":"crossref","unstructured":"Puripunpinyo, H., & Samadzadeh, M. (2017). Effect of optimizing Java deployment artifacts on AWS Lambda. 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). doi:10.1109\/infcomw.2017.8116416","DOI":"10.1109\/INFCOMW.2017.8116416"},{"key":"10.1016\/j.procs.2021.01.320_bib7","unstructured":"Fowler, S. (n.d.). Production-Ready Microservice. O\u2019Reilly. Retrieved October 20, 2020, from https:\/\/www.oreilly.com\/library\/view\/production-ready-microservices\/9781491965962\/ch04.html"},{"key":"10.1016\/j.procs.2021.01.320_bib8","series-title":"The art of scalability: Scalable web architecture, processes, and organizations for the modern enterprise","author":"Abbott","year":"2015"},{"key":"10.1016\/j.procs.2021.01.320_bib9","doi-asserted-by":"crossref","unstructured":"Sun, Y., Nanda, S., & Jaeger, T. (2015). Security-as-a-Service for Microservices-Based Cloud Applications. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). doi:10.1109\/cloudcom.2015.93","DOI":"10.1109\/CloudCom.2015.93"},{"key":"10.1016\/j.procs.2021.01.320_bib10","unstructured":"Bon\u00e9r, J. (2026, April 1). Bla bla microservices bla bla. Retrieved October 20, 2020, from http:\/\/jonasboner.com\/resources\/bla-bla-microservices-bla-bla.pdf"},{"key":"10.1016\/j.procs.2021.01.320_bib11","unstructured":"I. Nadareishvili. Microservices shift complexity to where it belongs. Retrieved from https:\/\/www.oreilly.com\/ideas\/microservices-shift-complexity-to-where-it-belongs"},{"key":"10.1016\/j.procs.2021.01.320_bib12","unstructured":"Cluley, G. Mystery surrounds iCloud hack as naked celebrity photos leak. Retrieved from https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/"},{"key":"10.1016\/j.procs.2021.01.320_bib13","unstructured":"OWASP. Authentication cheat sheet. Retrieved from https:\/\/www.owasp.org\/index.php\/AuthenticationCheatSheet#AuthenticationGeneralGuidelines"},{"key":"10.1016\/j.procs.2021.01.320_bib14","unstructured":"Team, N. (2019, July 17). What is the Server-Side Request Forgery Vulnerability & How to Prevent It? Retrieved October 20, 2020, from https:\/\/www.netsparker.com\/blog\/web-security\/server-side-request-forgery-vulnerability-ssrf\/"},{"key":"10.1016\/j.procs.2021.01.320_bib15","unstructured":"Schneider, B. Schneider on security. Retrieved from https:\/\/www.schneier.com\/blog\/archives\/2015\/09\/thesecurityri4.html"},{"key":"10.1016\/j.procs.2021.01.320_bib16","unstructured":"NEWMAN, S. (2018). BUILDING MICROSERVICES: Designing fine-grained systems. Retrieved October 20, 2020, from https:\/\/www.amazon.com\/Building-Microservices-Designing-Fine-Grained-Systems\/dp\/1491950358"},{"key":"10.1016\/j.procs.2021.01.320_bib17","unstructured":"Hofmann, M. (2017, March 13). \u200eMicroservices Best Practices for Java. Retrieved October 20, 2020, from https:\/\/books.apple.com\/us\/book\/microservices-best-practices-for-java\/id1194724476"},{"key":"10.1016\/j.procs.2021.01.320_bib18","unstructured":"Daya, S. (2015). Microservices from theory to practice: Creating applications in IBM Bluemix using the microservices approach. Retrieved October 20, 2020, from https:\/\/www.amazon.com\/Microservices-Theory-Practice-Creating-Applications\/dp\/0738440817"},{"key":"10.1016\/j.procs.2021.01.320_bib19","unstructured":"Lewis, J. (2014). Episode 213: James Lewis on Microservices. Retrieved October 20, 2020, from https:\/\/www.se-radio.net\/2014\/10\/episode-213-james-lewis-on-microservices\/"},{"key":"10.1016\/j.procs.2021.01.320_bib20","unstructured":"Nishanil. (2018). Microservices architecture. Retrieved October 20, 2020, from https:\/\/docs.microsoft.com\/en-us\/dotnet\/architecture\/microservices\/architect-microservice-container-applications\/microservices-architecture"},{"key":"10.1016\/j.procs.2021.01.320_bib21","unstructured":"Synopsys. (2015). The Heartbleed Bug. Retrieved October 20, 2020, from https:\/\/heartbleed.com\/"},{"key":"10.1016\/j.procs.2021.01.320_bib22","doi-asserted-by":"crossref","unstructured":"N. M. Coelho, B. Fonseca, and A. Castro. Paranoid operating system methodology for anonymous & secure web browsing, doctoral project. [Online]. Available: http:\/\/dx.doi.org\/10.18803\/capsi.v17.127-143","DOI":"10.18803\/capsi.v17.127-143"},{"key":"10.1016\/j.procs.2021.01.320_bib23","doi-asserted-by":"crossref","unstructured":"N. M. Coelho, M. Peixoto and M. M. Cruz-Cunha. Prototype of a paranoid mobile operating system distribution. 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 2019, pp. 1-6, doi: 10.1109\/ISDFS.2019.8757551.","DOI":"10.1109\/ISDFS.2019.8757551"},{"key":"10.1016\/j.procs.2021.01.320_bib24","unstructured":"Sharif, A. (2017). Global Cybersecurity Leader. Retrieved October 20, 2020, from https:\/\/www.aporeto.com\/accelerating-business-devops-and-microservices-part-ii-running-safer"},{"key":"10.1016\/j.procs.2021.01.320_bib25","unstructured":"The Age of Microservices - Amazon ECS Service Discovery. (2018, June 28). Retrieved October 20, 2020, from https:\/\/www.trinimbus.com\/blog\/the-age-of-microservices-amazon-ecs-service-discovery\/"},{"key":"10.1016\/j.procs.2021.01.320_bib26","unstructured":"Sahni, V. (n.d.). Best Practices for Building a Microservice Architecture. Retrieved October 20, 2020, from https:\/\/www.vinaysahni.com\/best-practices-for-building-a-microservice-architecture"},{"key":"10.1016\/j.procs.2021.01.320_bib27","first-page":"333","article-title":"You Are Not Netflix","author":"Vu\u010dkovi\u0107","year":"2019","journal-title":"Microservices"},{"key":"10.1016\/j.procs.2021.01.320_bib28","doi-asserted-by":"crossref","unstructured":"Hassan, S., Ali, N., & Bahsoon, R. (2017). Microservice Ambients: An Architectural Meta-Modelling Approach for Microservice Granularity. 2017 IEEE International Conference on Software Architecture (ICSA). doi:10.1109\/icsa.2017.32","DOI":"10.1109\/ICSA.2017.32"},{"key":"10.1016\/j.procs.2021.01.320_bib29","doi-asserted-by":"crossref","unstructured":"Mateus-Coelho, N., Fonseca, B., & Castro, A. (1970, January 01). POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing. Retrieved October 20, 2020, from https:\/\/www.igi-global.com\/chapter\/posmasweb\/261743","DOI":"10.4018\/978-1-7998-5728-0.ch023"},{"key":"10.1016\/j.procs.2021.01.320_bib30","doi-asserted-by":"crossref","unstructured":"Guaman, D., Yaguachi, L., Samanta, C. C., Danilo, J. H., & Soto, F. (2018). Performance evaluation in the migration process from a monolithic application to microservices. 2018 13th Iberian Conference on Information Systems and Technologies (CISTI). doi:10.23919\/cisti.2018.8399148","DOI":"10.23919\/CISTI.2018.8399148"},{"key":"10.1016\/j.procs.2021.01.320_bib31","doi-asserted-by":"crossref","unstructured":"Carvalho, L., Garcia, A., Assuncao, W. K., Mello, R. D., & Lima, M. J. (2019). Analysis of the Criteria Adopted in Industry to Extract Microservices. 2019 IEEE\/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry (CESI) and 6th International Workshop on Software Engineering Research and Industrial Practice (SER&IP). doi:10.1109\/cesser-ip.2019.00012","DOI":"10.1109\/CESSER-IP.2019.00012"},{"key":"10.1016\/j.procs.2021.01.320_bib32","doi-asserted-by":"crossref","unstructured":"Yarygina, T., & Bagge, A. H. (2018). Overcoming Security Challenges in Microservice Architectures. 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE). doi:10.1109\/sose.2018.00011","DOI":"10.1109\/SOSE.2018.00011"},{"issue":"6","key":"10.1016\/j.procs.2021.01.320_bib33","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MSP.2016.129","article-title":"Building Critical Applications Using Microservices","volume":"14","author":"Fetzer","year":"2016","journal-title":"IEEE Security & Privacy"},{"key":"10.1016\/j.procs.2021.01.320_bib34","doi-asserted-by":"crossref","unstructured":"Torkura, K. A., Sukmana, M. I., Kayem, A. V., Cheng, F., & Meinel, C. (2018). A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom). doi:10.1109\/bdcloud.2018.00137","DOI":"10.1109\/BDCloud.2018.00137"},{"key":"10.1016\/j.procs.2021.01.320_bib35","doi-asserted-by":"crossref","unstructured":"Sun, Y., Nanda, S., & Jaeger, T. (2015). Security-as-a-Service for Microservices-Based Cloud Applications. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). doi:10.1109\/cloudcom.2015.93","DOI":"10.1109\/CloudCom.2015.93"},{"issue":"2","key":"10.1016\/j.procs.2021.01.320_bib36","doi-asserted-by":"crossref","first-page":"50","DOI":"10.4018\/IJWP.2018070104","article-title":"Modernizing Legacy Systems","volume":"10","author":"Vijaya","year":"2018","journal-title":"International Journal of Web Portals"},{"key":"10.1016\/j.procs.2021.01.320_bib37","doi-asserted-by":"crossref","unstructured":"Raj, V., & Ravichandra, S. (2018). Microservices: A perfect SOA based solution for Enterprise Applications compared to Web Services. 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). doi:10.1109\/rteict42901.2018.9012140","DOI":"10.1109\/RTEICT42901.2018.9012140"},{"issue":"4","key":"10.1016\/j.procs.2021.01.320_bib38","doi-asserted-by":"crossref","first-page":"28","DOI":"10.4018\/jwp.2010100103","article-title":"The Philosophy of Software Architecture","volume":"2","author":"Goel","year":"2010","journal-title":"International Journal of Web Portals"},{"issue":"3","key":"10.1016\/j.procs.2021.01.320_bib39","doi-asserted-by":"crossref","first-page":"56","DOI":"10.4018\/jwp.2009070104","article-title":"Conceptual Business Service","volume":"1","author":"Clohesy","year":"2009","journal-title":"International Journal of Web Portals"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921003719?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921003719?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,12,18]],"date-time":"2022-12-18T15:48:16Z","timestamp":1671378496000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050921003719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":39,"alternative-id":["S1877050921003719"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.320","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security in Microservices Architectures","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.320","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}