2019 XLV Latin American Computing Conference (CLEI) 2019
DOI: 10.1109/clei47609.2019.235060
|View full text |Cite
|
Sign up to set email alerts
|

Security Mechanisms Used in Microservices-Based Systems: A Systematic Mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(40 citation statements)
references
References 33 publications
2
29
0
Order By: Relevance
“…The study result indicates that practitioners use patterns (e.g., Access token), cloud solutions (e.g., Role-Based Access Control), and development practices (e.g., DevSecOps) as solutions to address security challenges (see Section 4.2.5). We also found that some review studies (e.g., [8,18,110,111]) collected a comprehensive set of standards, strategies, and mechanisms from grey and peer review literature that can be used as solutions to secure microservices systems.…”
Section: Major Msa Design Challenges and Their Solutionsmentioning
confidence: 96%
See 3 more Smart Citations
“…The study result indicates that practitioners use patterns (e.g., Access token), cloud solutions (e.g., Role-Based Access Control), and development practices (e.g., DevSecOps) as solutions to address security challenges (see Section 4.2.5). We also found that some review studies (e.g., [8,18,110,111]) collected a comprehensive set of standards, strategies, and mechanisms from grey and peer review literature that can be used as solutions to secure microservices systems.…”
Section: Major Msa Design Challenges and Their Solutionsmentioning
confidence: 96%
“…Microservices provide public interfaces, use networkexposed APIs, and develop applications using polyglot technologies, thus open the doors to intruders, and consequently the security of messages, queues, and API endpoints requires advanced strategies to protect at the infrastructure and code level. According to the literature review conducted by Pereira-Vale et al, [18], authentication, authorization, and credentials are the most widely used security strategies by microservices developers. (2) Regarding availability, one of the main benefits of MSA (and also one of the reasons that the industry adopts MSA) is that it provides a fault-tolerant architectural style [30].…”
Section: Quality Attributesmentioning
confidence: 99%
See 2 more Smart Citations
“…Surprisingly, few works are found focusing on security aspects in MSA. All found studies, except the work of Vale et al [9], are either platform or technology dependent investigations.…”
Section: Related Workmentioning
confidence: 99%