{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T20:53:31Z","timestamp":1776718411175,"version":"3.51.2"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030504168","type":"print"},{"value":"9783030504175","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50417-5_36","type":"book-chapter","created":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T20:09:52Z","timestamp":1592510992000},"page":"482-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Microservice Disaster Crash Recovery: A Weak Global Referential Integrity Management"],"prefix":"10.1007","author":[{"given":"Maude","family":"Manouvrier","sequence":"first","affiliation":[]},{"given":"Cesare","family":"Pautasso","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Rukoz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"issue":"1","key":"36_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/BF01784241","volume":"9","author":"M Ahamad","year":"1995","unstructured":"Ahamad, M., Neiger, G., Burns, J.E., Kohli, P., Hutto, P.W.: Causal memory: definitions, implementation, and programming. Distrib. Comput. 9(1), 37\u201349 (1995). https:\/\/doi.org\/10.1007\/BF01784241","journal-title":"Distrib. Comput."},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-31646-4_1","volume-title":"Microservices","author":"L Baresi","year":"2020","unstructured":"Baresi, L., Garriga, M.: Microservices: the evolution and extinction of web services? Microservices, pp. 3\u201328. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-31646-4_1"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Mohan, C., Brannon, K.W., Narang, I., Hsiao, H.I., Subramanian, M.: Coordinating backup\/recovery and data consistency between database and file systems. In: ACM SIGMOD International Conference on Management of data, pp. 500\u2013511. ACM (2002)","DOI":"10.1145\/564691.564749"},{"key":"36_CR4","unstructured":"Blaha, M.: Referential integrity is important for databases. Modelsoft Consulting Corp. (2005)"},{"issue":"2","key":"36_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MC.2012.37","volume":"45","author":"E Brewer","year":"2012","unstructured":"Brewer, E.: CAP twelve years later: how the \u201crules\u201d have changed. Computer 45(2), 23\u201329 (2012)","journal-title":"Computer"},{"issue":"3","key":"36_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MS.2018.2141026","volume":"35","author":"A Bucchiarone","year":"2018","unstructured":"Bucchiarone, A., Dragoni, N., Dustdar, S., Larsen, S.T., Mazzara, M.: From monolithic to microservices: an experience report from the banking domain. IEEE Softw. 35(3), 50\u201355 (2018)","journal-title":"IEEE Softw."},{"key":"36_CR7","volume-title":"Database Systems. ke-3","author":"T Connoly","year":"1998","unstructured":"Connoly, T., Begg, C.: Database Systems. ke-3. Addison-Wesley, England (1998)"},{"key":"36_CR8","unstructured":"Date, C.J.: Referential integrity. In: 7th International Conference on Very Large Data Bases (VLDB), pp. 2\u201312 (1981)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Davis, H.C.: Referential integrity of links in open hypermedia systems. In: 9th ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space, pp. 207\u2013216 (1998)","DOI":"10.1145\/276627.276650"},{"key":"36_CR10","unstructured":"DeMichiel, L., Keith, M.: Java persistence API. JSR 220 (2006)"},{"key":"36_CR11","volume-title":"Fundamentals of Database Systems","author":"R Elmasri","year":"2010","unstructured":"Elmasri, R., Navathe, S.: Fundamentals of Database Systems. Addison-Wesley, Boston (2010)"},{"issue":"7\u201311","key":"36_CR12","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1016\/0169-7552(96)00069-4","volume":"28","author":"D Ingham","year":"1996","unstructured":"Ingham, D., Caughey, S., Little, M.: Fixing the \u201cbroken-link\" problem: the W3objects approach. Comput. Netw. ISDN Syst. 28(7\u201311), 1255\u20131268 (1996)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"36_CR13","first-page":"1","volume":"14","author":"H Knoche","year":"2019","unstructured":"Knoche, H., Hasselbring, W.: Drivers and barriers for microservice adoption-a survey among professionals in Germany. Enterp. Model. Inf. Syst. Architect. (EMISAJ) 14, 1\u20131 (2019)","journal-title":"Enterp. Model. Inf. Syst. Architect. (EMISAJ)"},{"key":"36_CR14","unstructured":"Lewis, J., Fowler, M.: Microservices a definition of this new architectural term (2014). http:\/\/martinfowler.com\/articles\/microservices.html"},{"issue":"1","key":"36_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/128765.128770","volume":"17","author":"C Mohan","year":"1992","unstructured":"Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Trans. Database Syst. (TODS) 17(1), 94\u2013162 (1992)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"36_CR16","volume-title":"Building Microservices: Designing Fine-Grained Systems","author":"S Newman","year":"2015","unstructured":"Newman, S.: Building Microservices: Designing Fine-Grained Systems. O\u2019Reilly, Newton (2015)"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Overeem, M., Spoor, M., Jansen, S.: The dark side of event sourcing: managing data conversion. In: 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 193\u2013204. IEEE (2017)","DOI":"10.1109\/SANER.2017.7884621"},{"issue":"1","key":"36_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCC.2018.011791714","volume":"5","author":"G Pardon","year":"2018","unstructured":"Pardon, G., Pautasso, C., Zimmermann, O.: Consistent disaster recovery for microservices: the BAC theorem. IEEE Cloud Comput. 5(1), 49\u201359 (2018)","journal-title":"IEEE Cloud Comput."},{"key":"36_CR19","unstructured":"Richardson, C.: Pattern: database per service (2018). https:\/\/microservices.io\/patterns\/data\/database-per-service.html. Accessed 02 Apr 2020"},{"key":"36_CR20","unstructured":"Richardson, C.: Pattern: event sourcing (2018). https:\/\/microservices.io\/patterns\/data\/event-sourcing.html. Accessed 01 Apr 2019"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Taibi, D., Lenarduzzi, V., Pahl, C.: Architectural patterns for microservices: a systematic mapping study. In: CLOSER, pp. 221\u2013232 (2018)","DOI":"10.5220\/0006798302210232"},{"key":"36_CR22","volume-title":"Database Systems: The Complete Book","author":"JD Ullman","year":"2001","unstructured":"Ullman, J.D., Garcia-Molina, H., Widom, J.: Database Systems: The Complete Book, 1st edn. Prentice Hall, Upper Saddle River (2001)","edition":"1"},{"key":"36_CR23","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s00450-016-0337-0","volume":"32","author":"O Zimmermann","year":"2016","unstructured":"Zimmermann, O.: Microservices tenets. Comput. Sci. Res. Dev. 32, 301\u2013310 (2016). https:\/\/doi.org\/10.1007\/s00450-016-0337-0","journal-title":"Comput. Sci. Res. Dev."},{"key":"36_CR24","unstructured":"Zimmermann, O., Stocker, M., L\u00fcbke, D., Pautasso, C., Zdun, U.: Introduction to microservice API patterns (MAP). In: Joint Post-Proceedings of the First and Second International Conference on Microservices (Microservices 2017\/2019). OpenAccess Series in Informatics (OASIcs), vol. 78, pp. 4:1\u20134:17 (2020)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50417-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:14:15Z","timestamp":1718666055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50417-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030504168","9783030504175"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50417-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"248 workshop papers were selected from 489 submissions to the thematic tracks. The conference was canceled due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}