2018
DOI: 10.1016/j.procs.2018.04.047
|View full text |Cite
|
Sign up to set email alerts
|

Defense-in-depth and Role Authentication for Microservice Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…• The call to the different microservices corresponding to the credentials is established (by a nurse, doctor, IT developer or administrator). • Based on the considerations described above, microservices are classified based on the common characteristics of their operation [52], [53] into three groups [14]: the first performs the control and management of user accounts, roles, permissions [54] and manages the measurements received from the biosensors [55], [56]; the second group administers the different patients, affiliated institutions and manages the medical data collected by the first group [14]; and the third is responsible for infectious disease registries. It is also responsible for receiving notifications from the clinical decision support system (CDSS) for the prevention, treatment and management of the three groups of infectious diseases, using the model detailed by Baldominos et al [6].…”
Section: ) Platformmentioning
confidence: 99%
See 1 more Smart Citation
“…• The call to the different microservices corresponding to the credentials is established (by a nurse, doctor, IT developer or administrator). • Based on the considerations described above, microservices are classified based on the common characteristics of their operation [52], [53] into three groups [14]: the first performs the control and management of user accounts, roles, permissions [54] and manages the measurements received from the biosensors [55], [56]; the second group administers the different patients, affiliated institutions and manages the medical data collected by the first group [14]; and the third is responsible for infectious disease registries. It is also responsible for receiving notifications from the clinical decision support system (CDSS) for the prevention, treatment and management of the three groups of infectious diseases, using the model detailed by Baldominos et al [6].…”
Section: ) Platformmentioning
confidence: 99%
“…The microservices developed in PHP use the Laravel framework, while the those developed in Python use the Django framework. It should be noted that all microservices developed in SPIDEP have an asynchronous HTTPS server based on TLS for client authentication [25], [54], and the databases applied to each one were SQL (MariaDB) and NoSQL (Cassandra or MongoDB). As a complement to this microservicesbased architecture, we use the "service instance per container" and "database per service" implementation patterns [64].…”
Section: Figure 2 Framework For the Automation And Continuous Deploymentioning
confidence: 99%
“…Thus, in a single microservices-based application system, the constituting services may be built using different languages (e.g., Ruby, Golang, Java) and may be hosting different stores (e.g., document datastore, graphical Database (DB), or multimedia DB). Each component service is developed by a team-a microservice or DevOps team-which provides all of the development and operational requirements for that service with a high degree of autonomy regarding development and deployment techniques so long as the service functionality or service contract is agreed upon [6].…”
Section: Building Blocksmentioning
confidence: 99%
“…Selected studies Defense-in-depth and Role Authentication for Microservice Systems [12]. 2 A Cluster of CP-ABE Microservices for VANET [13].…”
mentioning
confidence: 99%