Security in microservice-based systems: A Multivocal literature review
暂无分享,去创建一个
Hernán Astudillo | Eduardo B. Fernandez | Gastón Márquez | Anelis Pereira Vale | Raúl Monge | H. Astudillo | E. Fernández | R. Monge | Gastón Márquez | A. P. Vale
[1] Bhaskar Krishnamachari,et al. BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces , 2019, 2019 IEEE International Smart Cities Conference (ISC2).
[2] Xi Zheng,et al. A survey on security issues in services communication of Microservices‐enabled fog applications , 2019, Concurr. Comput. Pract. Exp..
[3] Roel Wieringa,et al. Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.
[4] Marc-Oliver Pahl,et al. All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).
[5] Kai Petersen,et al. Systematic Mapping Studies in Software Engineering , 2008, EASE.
[6] Hernán Astudillo,et al. Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping , 2019, 2019 XLV Latin American Computing Conference (CLEI).
[7] Alan Sill,et al. The Design and Architecture of Microservices , 2016, IEEE Cloud Computing.
[8] Rüdiger Kapitza,et al. Secure Cloud Micro Services Using Intel SGX , 2017, DAIS.
[9] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[10] Anya Helene Bagge,et al. Overcoming Security Challenges in Microservice Architectures , 2018, 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE).
[11] Wenquan Jin,et al. Microservice Security Agent Based On API Gateway in Edge Computing , 2019, Sensors.
[12] Chien-An Chen. With Great Abstraction Comes Great Responsibility: Sealing the Microservices Attack Surface , 2019, 2019 IEEE Cybersecurity Development (SecDev).
[13] Tetiana Yarygina,et al. A Game of Microservices: Automated Intrusion Response , 2018, DAIS.
[14] Ali E. Abdallah,et al. Securing Microservices , 2019, IT Professional.
[15] Kai Jander,et al. Defense-in-depth and Role Authentication for Microservice Systems , 2018, ANT/SEIT.
[16] Christof Fetzer,et al. Building Critical Applications Using Microservices , 2016, IEEE Security & Privacy.
[17] Vahid Garousi,et al. Guidelines for including the grey literature and conducting multivocal literature reviews in software engineering , 2017, Inf. Softw. Technol..
[18] Tetiana Yarygina,et al. Low-Level Exploitation Mitigation by Diverse Microservices , 2017, ESOCC.
[19] Deep Medhi,et al. A Secure Microservice Framework for IoT , 2017, 2017 IEEE Symposium on Service-Oriented System Engineering (SOSE).
[20] Hyunseok Chang,et al. eZTrust: Network-Independent Zero-Trust Perimeterization for Microservices , 2019, SOSR.
[21] Arjan Kuijper,et al. Implementing secure applications in smart city clouds using microservices , 2019, Future Gener. Comput. Syst..
[22] Kai Jander,et al. Practical Defense-in-depth Solution for Microservice Systems , 2019, J. Ubiquitous Syst. Pervasive Networks.
[23] Eduardo B. Fernandez,et al. A Comprehensive Pattern-Driven Security Methodology for Distributed Systems , 2014, 2014 23rd Australian Software Engineering Conference.
[24] Cesare Pautasso,et al. Consistent Disaster Recovery for Microservices: the BAC Theorem , 2018, IEEE Cloud Computing.
[25] Ricardo Colomo Palacios,et al. DevSecOps: A Multivocal Literature Review , 2017, SPICE.
[26] Christoph Meinel,et al. Integrating Continuous Security Assessments in Microservices and Cloud Native Applications , 2017, UCC.
[27] Vahid Garousi,et al. Software test maturity assessment and test process improvement: A multivocal literature review , 2017, Inf. Softw. Technol..
[28] Wouter Joosen,et al. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows , 2017, Future Internet.
[29] Anne V. D. M. Kayem,et al. A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).
[30] Rory V. O'Connor,et al. A multivocal literature review on serious games for software process standards education , 2018, Comput. Stand. Interfaces.
[31] Wouter Joosen,et al. Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[32] Eduardo B. Fernández,et al. Revisiting Architectural Tactics for Security , 2015, ECSA.
[33] Alexander Pretschner,et al. Integrity Protection Against Insiders in Microservice-Based Infrastructures: From Threats to a Security Framework , 2018, STAF Workshops.
[34] Muhammad Shuaib Siddiqui,et al. Identity and Access Control for micro-services based 5G NFV platforms , 2018, ARES.
[35] Mohsen Ahmadvand,et al. Requirements Reconciliation for Scalable and Secure Microservice (De)composition , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
[36] Christopher Gerking,et al. Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures , 2019, 2019 IEEE International Conference on Software Architecture (ICSA).
[37] Quy Nguyen,et al. Applying Spring Security Framework and OAuth2 To Protect Microservice Architecture API , 2019, J. Softw..
[38] Claes Wohlin,et al. Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.
[39] Jyothi Salibindla,et al. Microservices API Security , 2018 .
[40] Qusay H. Mahmoud,et al. Claimsware: A Claims-Based Middleware for Securing IoT Services , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
[41] Yuqiong Sun,et al. Security-as-a-Service for Microservices-Based Cloud Applications , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[42] Yan Chen,et al. Towards Automated Inter-Service Authorization for Microservice Applications , 2019, SIGCOMM Posters and Demos.
[43] Marc-Oliver Pahl,et al. Securing IoT microservices with certificates , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[44] Zhenyu Wen,et al. GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds , 2020, IEEE Transactions on Parallel and Distributed Systems.
[45] Christian Esposito,et al. Security and privacy for cloud-based data management in the health network service chain: a microservice approach , 2017, IEEE Commun. Mag..
[46] Miklós Kozlovszky,et al. Authentication and authorization orchestrator for microservice-based software architectures , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[47] Xudong Yang,et al. Authentication and Authorization of End User in Microservice Architecture , 2017 .
[48] Marc-Oliver Pahl,et al. Graph-based IoT microservice security , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[49] Vahid Garousi,et al. When and what to automate in software testing? A multi-vocal literature review , 2016, Inf. Softw. Technol..
[50] Mianxiong Dong,et al. Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.