Proceedings of the 23rd European Conference on Pattern Languages of Programs 2018
DOI: 10.1145/3282308.3282319
|View full text |Cite
|
Sign up to set email alerts
|

Interface Quality Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Request Bundle and Rate Limit have been defined as best practices or patterns [27], [28], [29], [30], and particularly in the context of Service-Level Agreements [31], [32]. Although these API patterns have been studied experimentally [5], [33], their combinations with other API patterns and techniques have not been the subject of any experimental study in the scientific literature.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Request Bundle and Rate Limit have been defined as best practices or patterns [27], [28], [29], [30], and particularly in the context of Service-Level Agreements [31], [32]. Although these API patterns have been studied experimentally [5], [33], their combinations with other API patterns and techniques have not been the subject of any experimental study in the scientific literature.…”
Section: Related Workmentioning
confidence: 99%
“…Rate Limit has also been the focus of many studies [7], [27], [29], but has also not been studied with combinations of other patterns and techniques. It is usually implemented using an API Gateway [36] and ensures that API providers are not overwhelmed by an intentional or unintentional flood of requests from API clients.…”
Section: Background About Load Balancing Request Bundle and Rate Limitmentioning
confidence: 99%
“…The case study is based on a fictional insurance company called Lakeside Mutual [76]. The application serves to exemplify different API patterns and DDD for MSA.…”
Section: Case Studymentioning
confidence: 99%
“…It is important to note that the client may not be a person but another computer system that uses the functions of another organization’s application system. JWT tokens can be used as an access control mechanism in the microservices architecture [ 7 ]. Tokens are a standardized method of representing authentication and authorization data, and they can be used to implement a wide variety of access management scenarios in the microservices architecture.…”
Section: Introductionmentioning
confidence: 99%