Securing microservices and microservice architectures: A systematic mapping study
Tài liệu tham khảo
Yarygina, 2018, Overcoming security challenges in microservice architectures, 11
Baškarada, 2018, Architecting microservices: Practical opportunities and challenges, J. Comput. Inf. Syst., 1
Dragoni, 2017, 195
Alshuqayran, 2016, A systematic mapping study in microservice architecture, 44
Bogner, 2019, Microservices in industry: Insights into technologies, characteristics, and software quality, 187
Kitchenham, 2015
K. Petersen, R. Feldt, S. Mujtaba, M. Mattsson, Systematic mapping studies in software engineering, in: Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, EASE’08, Swindon, UK, 2008, pp. 68–77.
Petersen, 2015, Guidelines for conducting systematic mapping studies in software engineering: An update, Inf. Softw. Technol., 64, 1, 10.1016/j.infsof.2015.03.007
A.P. Vale, G. Márquez, H. Astudillo, E.B. Fernandez, Security mechanisms used in microservices-based systems: A systematic mapping, in: XLV Latin American Computing Conference, 2019, pp. 1–10.
Yu, 2019, A survey on security issues in services communication of microservices-enabled fog applications, Concurr. Comput.: Pract. Exper., 31, 10.1002/cpe.4436
de Aguiar Monteiro, 2018, A survey on microservice security–trends in architecture, privacy and standardization on cloud computing environments, Int. J. Adv. Secur., 11, 201
Nkomo, 2019, Software development activities for secure microservices, 573
Sultan, 2019, Container security: Issues, challenges, and the road ahead, IEEE Access, 7, 52976, 10.1109/ACCESS.2019.2911732
Bélair, 2019, Leveraging kernel security mechanisms to improve container security: A survey, 76:1
Felderer, 2018, Guidelines for systematic mapping studies in security engineering, 47
Kuhrmann, 2017, On the pragmatic design of literature studies in software engineering: an experience-based guideline, Empir. Softw. Eng., 22, 2852, 10.1007/s10664-016-9492-y
Petticrew, 2006
Wohlin, 2014, Guidelines for snowballing in systematic literature studies and a replication in software engineering, 1
Wohlin, 2016, Second-generation systematic literature studies using snowballing, 1
M.S. Farooq, S. Riaz, A. Abid, T. Umer, Y.B. Zikria, Role of iot technology in agriculture: A systematic literature review, Electronics 9 (2). http://dx.doi.org/10.3390/electronics9020319.
Fernandez, 2011, Usability evaluation methods for the web: A systematic mapping study, Inf. Softw. Technol., 53, 789, 10.1016/j.infsof.2011.02.007
OWASP, 2017
Strauss, 1998
Ahmadvand, 2018, Integrity protection against insiders in microservice-based infrastructures: From threats to a security framework, 573
Surantha, 2020, Secure kubernetes networking design based on zero trust model: A case study of financial service enterprise in indonesia, 348
Brenner, 2017, Secure cloud micro services using intel sgx, 177
Otterstad, 2017, Low-level exploitation mitigation by diverse microservices, 49
Yarygina, 2018, A game of microservices: Automated intrusion response, 169
Nehme, 2019, Fine-grained access control for microservices, 285
Bánáti, 2018, Authentication and authorization orchestrator for microservice-based software architectures, 1180
Nagothu, 2018, A microservice-enabled architecture for smart surveillance using blockchain technology, 1
Pahl, 2018, Graph-based iot microservice security, 1
Thanh, 2016, Embedding security and privacy into the development and operation of cloud applications and services, 31
Sun, 2015, Security-as-a-service for microservices-based cloud applications, 50
Buzachis, 2018, Basic principles of osmotic computing: Secure and dependable microelements (mels) orchestration leveraging blockchain facilities, 47
George, 2017, Claimsware: A claims-based middleware for securing iot services, 649
Ranjbar, 2017, Synaptic: Secure and persistent connectivity for containers, 262
Ahmadvand, 2016, Requirements reconciliation for scalable and secure microservice (de)composition, 68
Torkura, 2018, A cyber risk based moving target defense mechanism for microservice architectures, 932
Jin, 2019, Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud, IEEE Trans. Dependable Secure Comput., 1, 10.1109/TDSC.2019.2916666
Gerking, 2019, Component-based refinement and verification of information-flow security policies for cyber–physical microservice architectures, 61
Osman, 2019, Sandnet: Towards high quality of deception in container-based microservice architectures, 1
M. Pahl, F. Aubet, All eyes on you: Distributed multi-dimensional iot microservice anomaly detection, in: 2018 14th International Conference on Network and Service Management (CNSM), 2018, pp. 72–80.
Ravichandiran, 2018, Anomaly detection using resource behaviour analysis for autoscaling systems, 192
Wen, 2019, Ga-par: Dependable microservice orchestration framework for geo-distributed clouds, IEEE Trans. Parallel Distrib. Syst., 1
Lu, 2017, A secure microservice framework for iot, 9
Pahl, 2018, Securing iot microservices with certificates, 1
Nehme, 2019, Securing microservices, IT Prof., 21, 42, 10.1109/MITP.2018.2876987
Fetzer, 2016, Building critical applications using microservices, IEEE Secur. Privacy, 14, 86, 10.1109/MSP.2016.129
Nguyen, 2019, Applying spring security framework and oauth2 to protect microservice architecture API, JSW, 14, 257, 10.17706/jsw.14.6.257-264
He, 2017, Authentication and authorization of end user in microservice architecture, J. Phys. Conf. Ser., 910, 10.1088/1742-6596/910/1/012060
O. Baker, Q. Nguyen, A novel approach to secure microservice architecture from owasp vulnerabilities, in: Proceedings of the 10th Annual CITRENZ Conference (2019), ITx New Zealand’s Conference of IT, Nelson, NZ, 2019, pp. 54–58.
Salibindla, 2018, Microservices api security, Int. J. Eng. Res. Technol., 7, 277
Jander, 2019, Practical defense-in-depth solution for microservice systems, J. Ubiquit. Syst. Pervasive Netw., 11, 17, 10.5383/JUSPN.11.01.003
Torkura, 2018, Cavas: Neutralizing application and container security vulnerabilities in the cloud native era, 471
Chen, 2019, Informer: Irregular traffic detection for containerized microservices rpc in the real world, 389
Torkura, 2017, Integrating continuous security assessments in microservices and cloud native applications, 171
Akkermans, 2018, Polyglot cerberos: Resource security, interoperability and multi-tenancy for iot services on a multilingual platform, 59
Guija, 2018, Identity and access control for micro-services based 5g nfv platforms, 46:1
Li, 2019, Towards automated inter-service authorization for microservice applications, 3
Márquez, 2019, Identifying availability tactics to support security architectural design of microservice-based systems, 123
Ibrahim, 2019, Attack graph generation for microservice architecture, 1235
Stallenberg, 2019, Jcomix: A search-based tool to detect xml injection vulnerabilities in web applications, 1090
Krämer, 2019, Implementing secure applications in smart city clouds using microservices, Future Gener. Comput. Syst., 99, 308, 10.1016/j.future.2019.04.042
Jander, 2018, Defense-in-depth and role authentication for microservice systems, Procedia Comput. Sci., 130, 456, 10.1016/j.procs.2018.04.047
Abidi, 2019, A web service security governance approach based on dedicated micro-services, Procedia Comput. Sci., 159, 372, 10.1016/j.procs.2019.09.192
Elsayed, 2019, Offering security diagnosis as a service for cloud saas applications, J. Inf. Secur. Appl., 44, 32
Mavroudis, 2017, A touch of evil: High-assurance cryptographic hardware from untrusted components, 1583
Vale, 2019, An ontology for security patterns, 1
IBM, 2016
Kindervag, 2012
Zhuang, 2014, Towards a theory of moving target defense, 31
Merkel, 2014, Docker: lightweight linux containers for consistent development and deployment, Linux J., 2014, 2