{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:06:37Z","timestamp":1770995197335,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030243074","type":"print"},{"value":"9783030243081","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24308-1_46","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T07:03:03Z","timestamp":1561705383000},"page":"573-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Software Development Activities for Secure Microservices"],"prefix":"10.1007","author":[{"given":"Peter","family":"Nkomo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9157-3079","authenticated-orcid":false,"given":"Marijke","family":"Coetzee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"46_CR1","unstructured":"Zimmermann, O.: Do microservices pass the same old architecture test? Or: SOA is not dead-long live (micro-)services. In: Microservices Workshop at SATURN Conference, SEI (2015)"},{"key":"46_CR2","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-67425-4_12","volume-title":"Present and Ulterior Software Engineering","author":"Nicola Dragoni","year":"2017","unstructured":"Dragoni, N., et al.: Microservices: yesterday, today, and tomorrow. In: Present and Ulterior Software Engineering, pp. 195\u2013216 (2017)"},{"key":"46_CR3","volume-title":"Microservice Architecture: Aligning Principles, Practices, and Culture","author":"I Nadareishvili","year":"2016","unstructured":"Nadareishvili, I., Mitra, R., McLarty, M., Amundsen, M.: Microservice Architecture: Aligning Principles, Practices, and Culture. O\u2019Reilly Media Inc., Newton (2016)"},{"key":"46_CR4","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-40564-3_8","volume-title":"Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures","author":"O Bossert","year":"2016","unstructured":"Bossert, O.: A two-speed architecture for the digital enterprise. In: El-Sheikh, E., Zimmermann, A., Jain, L.C. (eds.) Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures. ISRL, vol. 111, pp. 139\u2013150. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-40564-3_8"},{"key":"46_CR5","volume-title":"DevOps: A Software Architect\u2019s Perspective","author":"L Bass","year":"2015","unstructured":"Bass, L., Weber, I., Zhu, L.: DevOps: A Software Architect\u2019s Perspective. Addison-Wesley Professional, Boston (2015)"},{"issue":"1","key":"46_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCC.2015.10","volume":"2","author":"D Bernstein","year":"2015","unstructured":"Bernstein, D.: Is Amazon becoming the new cool software company for developers? IEEE Cloud Comput. 2(1), 69\u201371 (2015)","journal-title":"IEEE Cloud Comput."},{"key":"46_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-1-4842-1842-6_3","volume-title":"DevOps for Digital Leaders","author":"Aruna Ravichandran","year":"2016","unstructured":"Ravichandran, A., Taylor, K., Waterhouse, P.: DevOps foundations. In: DevOps for Digital Leaders, pp. 27\u201347. Apress, New York (2016)"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-67262-5_15","volume-title":"Service-Oriented and Cloud Computing","author":"L Baresi","year":"2017","unstructured":"Baresi, L., Filgueira Mendon\u00e7a, D., Garriga, M.: Empowering low-latency applications through a serverless edge computing architecture. In: De Paoli, F., Schulte, S., Broch Johnsen, E. (eds.) ESOCC 2017. LNCS, vol. 10465, pp. 196\u2013210. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-67262-5_15"},{"issue":"4","key":"46_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIC.2013.25","volume":"17","author":"DG Feitelson","year":"2013","unstructured":"Feitelson, D.G., Frachtenberg, E., Beck, K.L.: Development and deployment at facebook. IEEE Internet Comput. 17(4), 8\u201317 (2013)","journal-title":"IEEE Internet Comput."},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Feng, Q., Kazman, R., Cai, Y., Mo, R., Xiao, L.: Towards an architecture-centric approach to security analysis. In: 2016 13th Working IEEE\/IFIP Conference on Software Architecture (WICSA), pp. 221\u2013230. IEEE, April 2016","DOI":"10.1109\/WICSA.2016.41"},{"issue":"1","key":"46_CR11","first-page":"117","volume":"3","author":"V Lalsing","year":"2012","unstructured":"Lalsing, V., Kishnah, S., Pudaruth, S.: People factors in agile software development and project management. Int. J. Softw. Eng. Appl. 3(1), 117 (2012)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Butzin, B., Golatowski, F., Timmermann, D.: Microservices approach for the internet of things. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20136. IEEE, September 2016","DOI":"10.1109\/ETFA.2016.7733707"},{"key":"46_CR13","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.ins.2014.04.054","volume":"280","author":"QZ Sheng","year":"2014","unstructured":"Sheng, Q.Z., Qiao, X., Vasilakos, A.V., Szabo, C., Bourne, S., Xu, X.: Web services composition: a decade\u2019s overview. Inf. Sci. 280, 218\u2013238 (2014)","journal-title":"Inf. Sci."},{"key":"46_CR14","first-page":"85","volume":"82","author":"B Rogers","year":"2015","unstructured":"Rogers, B.: The social costs of Uber. U. Chi. L. Rev. Dialogue 82, 85 (2015)","journal-title":"U. Chi. L. Rev. Dialogue"},{"key":"46_CR15","unstructured":"Nadalin, A., Kaler, C., Monzillo, R., Hallam-Baker, P.: Web services security: SOAP message security 1.1 (WS-Security 2004). Oasis Standard, 200401 (2006)"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Shah, D., Patel, D.: Dynamic and ubiquitous security architecture for global SOA. In: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2008, pp. 482\u2013487. IEEE, September 2008","DOI":"10.1109\/UBICOMM.2008.68"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON web token (JWT) (No. RFC 7519) (2015)","DOI":"10.17487\/RFC7519"},{"issue":"239","key":"46_CR18","first-page":"2","volume":"2014","author":"D Merkel","year":"2014","unstructured":"Merkel, D.: Docker: lightweight Linux containers for consistent development and deployment. Linux J. 2014(239), 2 (2014)","journal-title":"Linux J."},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Martins, G., Bhatia, S., Koutsoukos, X., Stouffer, K., Tang, C., Candell, R.: Towards a systematic threat modeling approach for cyberphysical systems. In: Resilience Week (RWS), pp. 1\u20136. IEEE, August 2015","DOI":"10.1109\/RWEEK.2015.7287428"},{"issue":"1","key":"46_CR20","first-page":"40","volume":"7","author":"SS Priya","year":"2016","unstructured":"Priya, S.S., Arya, S.S.: Threat modeling for a secured software development. Int. J. Adv. Res. Comput. Sci. 7(1), 40\u201348 (2016)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"46_CR21","unstructured":"IEC\/ISO 7498-2: Information Processing Systems - Open Systems Interconnection, 7498-2 (1989)"},{"key":"46_CR22","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Sheffer, Y., Holz, R., Saint-Andre, P.: Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS) (No. RFC 7457) (2015)","DOI":"10.17487\/rfc7457"},{"key":"46_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/978-3-319-57186-7_58","volume-title":"Green, Pervasive, and Cloud Computing","author":"PN Borazjani","year":"2017","unstructured":"Borazjani, P.N.: Security issues in cloud computing. In: Au, M.H.A., Castiglione, A., Choo, K.-K.R., Palmieri, F., Li, K.-C. (eds.) GPC 2017. LNCS, vol. 10232, pp. 800\u2013811. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-57186-7_58"},{"key":"46_CR25","unstructured":"Gressin, S.: The Equifax Data Breach: What to Do (2017)"},{"key":"46_CR26","unstructured":"Behrens, S., Heffner J.: The avalanche application DoS in microservice architectures (2017). \n                      https:\/\/medium.com\/signal-sciences-labs\/starting-the-avalanche-application-dos-in-microservice-architectures-4f5eb4730a60\n                      \n                    . Accessed 20 Jan 2019"},{"key":"46_CR27","unstructured":"Open Security Alliance: IT Security Requirements (2017). \n                      http:\/\/www.opensecurityarchitecture.org\/cms\/definitions\/it_security_requirements\n                      \n                    . Accessed 15 Jan 2018"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24308-1_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T07:13:59Z","timestamp":1561706039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24308-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243074","9783030243081"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24308-1_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}