Proceedings of the 13th European Conference on Software Architecture - Volume 2 2019
DOI: 10.1145/3344948.3344996
|View full text |Cite
|
Sign up to set email alerts
|

Identifying availability tactics to support security architectural design of microservice-based systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(32 citation statements)
references
References 17 publications
0
32
0
Order By: Relevance
“…Security issues were examined at three different levels-component level, interface level and at application level [14]. • G. Marquez and H. Astudillo (2019) conducted an experimental study to analyze the availability tactics that would be beneficial for security-design decisions in micro-service based systems (MBS) [15]. 17 Open source MBS were inspected by using their source code and documentation.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Security issues were examined at three different levels-component level, interface level and at application level [14]. • G. Marquez and H. Astudillo (2019) conducted an experimental study to analyze the availability tactics that would be beneficial for security-design decisions in micro-service based systems (MBS) [15]. 17 Open source MBS were inspected by using their source code and documentation.…”
Section: Related Workmentioning
confidence: 99%
“…React and recover from attacks (F3): react to an attack means that a software system should have a security mechanism that responds in a particular way when the system faces a potential attack, while recover from an attack means that the system should also have the ability to return to a normal state after facing a potential attack [15][16][17][18]. In other words, we can say that the system should provide normal services to its authentic users when or after facing a potential attack.…”
Section: Software Security Tacticsmentioning
confidence: 99%
See 3 more Smart Citations