Microservice architectures are increasingly being used to develop application systems. Despite many guidelines and best practices being published, architecting microservice systems for security is challenging. Reasons are the size and complexity of microservice systems, their polyglot nature, and the demand for the continuous evolution of these systems. In this context, to manually validate that security architecture tactics are employed as intended throughout the system is a time-consuming and error-prone task. In this article, we present an approach to avoid such manual validation before each continuous evolution step in a microservice system, which we demonstrate using three widely used categories of security tactics: secure communicatio...
Security research is beneficial for companies that want their system protected against threats to th...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
This is the dataset for replicability for the article "Detection Strategies for Microservice Securit...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
Security has become paramount in modern software services as more and more security breaches emerge,...
The fast-paced development cycles of microservices applications increase the probability of insuffic...
Microservices have become the state-of-the-art architectural style for distributed systems, however ...
Microservices are a commonly used architectural style targeting independent development, deployment,...
The microservice architecture is an architectural style that structures an application as a collecti...
The microservice architecture enables organizations to shorten development cycles and deliver cloud-...
Since cyber-physical systems are inherently vulnerable to information leaks, software architects nee...
Despite the numerous benefits of microservices systems, security has been a critical issue in such s...
Security research is beneficial for companies that want their system protected against threats to th...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
This is the dataset for replicability for the article "Detection Strategies for Microservice Securit...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
Security has become paramount in modern software services as more and more security breaches emerge,...
The fast-paced development cycles of microservices applications increase the probability of insuffic...
Microservices have become the state-of-the-art architectural style for distributed systems, however ...
Microservices are a commonly used architectural style targeting independent development, deployment,...
The microservice architecture is an architectural style that structures an application as a collecti...
The microservice architecture enables organizations to shorten development cycles and deliver cloud-...
Since cyber-physical systems are inherently vulnerable to information leaks, software architects nee...
Despite the numerous benefits of microservices systems, security has been a critical issue in such s...
Security research is beneficial for companies that want their system protected against threats to th...
Decision-making in adaptive security management relies on sufficient and credible security evidence ...
Abstract — Decision-making in adaptive security management relies on sufficient and credible securit...