Security in microservice-based systems: A Multivocal literature review

[1]  Bhaskar Krishnamachari,et al.  BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces , 2019, 2019 IEEE International Smart Cities Conference (ISC2).

[2]  Xi Zheng,et al.  A survey on security issues in services communication of Microservices‐enabled fog applications , 2019, Concurr. Comput. Pract. Exp..

[3]  Roel Wieringa,et al.  Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.

[4]  Marc-Oliver Pahl,et al.  All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).

[5]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[6]  Hernán Astudillo,et al.  Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping , 2019, 2019 XLV Latin American Computing Conference (CLEI).

[7]  Alan Sill,et al.  The Design and Architecture of Microservices , 2016, IEEE Cloud Computing.

[8]  Rüdiger Kapitza,et al.  Secure Cloud Micro Services Using Intel SGX , 2017, DAIS.

[9]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[10]  Anya Helene Bagge,et al.  Overcoming Security Challenges in Microservice Architectures , 2018, 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE).

[11]  Wenquan Jin,et al.  Microservice Security Agent Based On API Gateway in Edge Computing , 2019, Sensors.

[12]  Chien-An Chen With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface , 2019, 2019 IEEE Cybersecurity Development (SecDev).

[13]  Tetiana Yarygina,et al.  A Game of Microservices: Automated Intrusion Response , 2018, DAIS.

[14]  Ali E. Abdallah,et al.  Securing Microservices , 2019, IT Professional.

[15]  Kai Jander,et al.  Defense-in-depth and Role Authentication for Microservice Systems , 2018, ANT/SEIT.

[16]  Christof Fetzer,et al.  Building Critical Applications Using Microservices , 2016, IEEE Security & Privacy.

[17]  Vahid Garousi,et al.  Guidelines for including the grey literature and conducting multivocal literature reviews in software engineering , 2017, Inf. Softw. Technol..

[18]  Tetiana Yarygina,et al.  Low-Level Exploitation Mitigation by Diverse Microservices , 2017, ESOCC.

[19]  Deep Medhi,et al.  A Secure Microservice Framework for IoT , 2017, 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE).

[20]  Hyunseok Chang,et al.  eZTrust: Network-Independent Zero-Trust Perimeterization for Microservices , 2019, SOSR.

[21]  Arjan Kuijper,et al.  Implementing secure applications in smart city clouds using microservices , 2019, Future Gener. Comput. Syst..

[22]  Kai Jander,et al.  Practical Defense-in-depth Solution for Microservice Systems , 2019, J. Ubiquitous Syst. Pervasive Networks.

[23]  Eduardo B. Fernandez,et al.  A Comprehensive Pattern-Driven Security Methodology for Distributed Systems , 2014, 2014 23rd Australian Software Engineering Conference.

[24]  Cesare Pautasso,et al.  Consistent Disaster Recovery for Microservices: the BAC Theorem , 2018, IEEE Cloud Computing.

[25]  Ricardo Colomo Palacios,et al.  DevSecOps: A Multivocal Literature Review , 2017, SPICE.

[26]  Christoph Meinel,et al.  Integrating Continuous Security Assessments in Microservices and Cloud Native Applications , 2017, UCC.

[27]  Vahid Garousi,et al.  Software test maturity assessment and test process improvement: A multivocal literature review , 2017, Inf. Softw. Technol..

[28]  Wouter Joosen,et al.  Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows , 2017, Future Internet.

[29]  Anne V. D. M. Kayem,et al.  A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).

[30]  Rory V. O'Connor,et al.  A multivocal literature review on serious games for software process standards education , 2018, Comput. Stand. Interfaces.

[31]  Wouter Joosen,et al.  Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[32]  Eduardo B. Fernández,et al.  Revisiting Architectural Tactics for Security , 2015, ECSA.

[33]  Alexander Pretschner,et al.  Integrity Protection Against Insiders in Microservice-Based Infrastructures: From Threats to a Security Framework , 2018, STAF Workshops.

[34]  Muhammad Shuaib Siddiqui,et al.  Identity and Access Control for micro-services based 5G NFV platforms , 2018, ARES.

[35]  Mohsen Ahmadvand,et al.  Requirements Reconciliation for Scalable and Secure Microservice (De)composition , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[36]  Christopher Gerking,et al.  Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures , 2019, 2019 IEEE International Conference on Software Architecture (ICSA).

[37]  Quy Nguyen,et al.  Applying Spring Security Framework and OAuth2 To Protect Microservice Architecture API , 2019, J. Softw..

[38]  Claes Wohlin,et al.  Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.

[39]  Jyothi Salibindla,et al.  Microservices API Security , 2018 .

[40]  Qusay H. Mahmoud,et al.  Claimsware: A Claims-Based Middleware for Securing IoT Services , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[41]  Yuqiong Sun,et al.  Security-as-a-Service for Microservices-Based Cloud Applications , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[42]  Yan Chen,et al.  Towards Automated Inter-Service Authorization for Microservice Applications , 2019, SIGCOMM Posters and Demos.

[43]  Marc-Oliver Pahl,et al.  Securing IoT microservices with certificates , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[44]  Zhenyu Wen,et al.  GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds , 2020, IEEE Transactions on Parallel and Distributed Systems.

[45]  Christian Esposito,et al.  Security and privacy for cloud-based data management in the health network service chain: a microservice approach , 2017, IEEE Commun. Mag..

[46]  Miklós Kozlovszky,et al.  Authentication and authorization orchestrator for microservice-based software architectures , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[47]  Xudong Yang,et al.  Authentication and Authorization of End User in Microservice Architecture , 2017 .

[48]  Marc-Oliver Pahl,et al.  Graph-based IoT microservice security , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[49]  Vahid Garousi,et al.  When and what to automate in software testing? A multi-vocal literature review , 2016, Inf. Softw. Technol..

[50]  Mianxiong Dong,et al.  Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.