2018
DOI: 10.1109/tla.2018.8789551
|View full text |Cite
|
Sign up to set email alerts
|

Review of Architectural Patterns and Tactics for Microservices in Academic and Industrial Literature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Various criteria of security tactics and design tactics have been combined together to prioritize security design tactics in this work. Recently, researchers and developers have followed security tactics and other programs with impressive effects and efficacious performance [12]- [14]. Still architects are looking for specific security tactics for applying security in web applications.…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Various criteria of security tactics and design tactics have been combined together to prioritize security design tactics in this work. Recently, researchers and developers have followed security tactics and other programs with impressive effects and efficacious performance [12]- [14]. Still architects are looking for specific security tactics for applying security in web applications.…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…Following step is to calculate the attribute's Fuzzy weight through the assistance of equation (14).…”
Section: Integrated Fuzzy Ahp-topsis Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast, high coupling, identification of the microservice boundaries, and decomposition of the pre-existing systems are identified as leading migration challenges. Besides that, we also identified an important body of knowledge that reports dozens of patterns for implementing different aspects (e.g., data management, deployment) of microservices systems [11,48,49,50,51]. However, none of these studies report how often practitioners use these patterns when designing microservices systems.…”
Section: Related Workmentioning
confidence: 99%