{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:37:33Z","timestamp":1754109453008,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031166969"},{"type":"electronic","value":"9783031166976"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16697-6_9","type":"book-chapter","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T07:12:17Z","timestamp":1662621137000},"page":"131-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Should Microservice Security Smells Stay or\u00a0be Refactored? Towards a\u00a0Trade-off Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6411-0511","authenticated-orcid":false,"given":"Francisco","family":"Ponce","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2435-3543","authenticated-orcid":false,"given":"Jacopo","family":"Soldani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6487-5813","authenticated-orcid":false,"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2048-2468","authenticated-orcid":false,"given":"Antonio","family":"Brogi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"9_CR1","volume-title":"Software Architecture in Practice","author":"L Bass","year":"2012","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional, Boston (2012)","edition":"3"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: The NFR framework in action. In: Non-Functional Requirements in Software Engineering, International Series in Software Engineering, vol. 5, pp. 15\u201345. Springer, Boston, MA (2000). https:\/\/doi.org\/10.1007\/978-1-4615-5269-7_2","DOI":"10.1007\/978-1-4615-5269-7_2"},{"issue":"7","key":"9_CR3","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/j.datak.2009.02.004","volume":"68","author":"G Elahi","year":"2009","unstructured":"Elahi, G., Yu, E.: Modeling and analysis of security trade-offs - a goal oriented approach. Data Knowl. Eng. 68(7), 579\u2013598 (2009). https:\/\/doi.org\/10.1016\/j.datak.2009.02.004","journal-title":"Data Knowl. Eng."},{"key":"9_CR4","unstructured":"ISO: Systems and software engineering \u2013 systems and software quality requirements and evaluation (square) \u2013 system and software quality models. ISO\/IEC FDIS 25010, 2011, pp. 1\u201334 (2011)"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J.: The architecture tradeoff analysis method. In: Proceedings of Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193), pp. 68\u201378 (1998). https:\/\/doi.org\/10.1109\/ICECCS.1998.706657","DOI":"10.1109\/ICECCS.1998.706657"},{"key":"9_CR6","unstructured":"M\u00e1rquez, G., Soldani, J., Ponce, F., Astudillo, H.: Frameworks and high-availability in microservices: an industrial survey. In: CIbSE, pp. 57\u201370 (2020)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-030-00761-4_21","volume-title":"Software Architecture","author":"A Martini","year":"2018","unstructured":"Martini, A., Fontana, F.A., Biaggi, A., Roveda, R.: Identifying and prioritizing architectural debt through architectural smells: a case study in a large software company. In: Cuesta, C.E., Garlan, D., P\u00e9rez, J. (eds.) ECSA 2018. LNCS, vol. 11048, pp. 320\u2013335. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00761-4_21"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Neri, D., Soldani, J., Zimmermann, O., Brogi, A.: Design principles, architectural smells and refactorings for microservices: a multivocal review. SICS Softw. Intens. Cyber-Phys. Syst. 35(1), 3\u201315 (2020)","DOI":"10.1007\/s00450-019-00407-8"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"de Oliveira Rosa, T., Daniel, J.F., Guerra, E.M., Goldman, A.: A method for architectural trade-off analysis based on patterns: evaluating microservices structural attributes. In: EuroPLoP (2020). https:\/\/doi.org\/10.1145\/3424771.3424809","DOI":"10.1145\/3424771.3424809"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Orellana, C., Villegas, M.M., Astudillo, H.: Assessing architectural patterns trade-offs using moment-based pattern taxonomies. In: XLV Latin American Computing Conference (CLEI) (2019). https:\/\/doi.org\/10.1109\/CLEI47609.2019.235086","DOI":"10.1109\/CLEI47609.2019.235086"},{"issue":"4","key":"9_CR11","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s00766-015-0229-z","volume":"21","author":"L Pasquale","year":"2015","unstructured":"Pasquale, L., Spoletini, P., Salehie, M., Cavallaro, L., Nuseibeh, B.: Automating trade-off analysis of security requirements. Requir. Eng. 21(4), 481\u2013504 (2015). https:\/\/doi.org\/10.1007\/s00766-015-0229-z","journal-title":"Requir. Eng."},{"key":"9_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111393","volume":"192","author":"F Ponce","year":"2022","unstructured":"Ponce, F., Soldani, J., Astudillo, H., Brogi, A.: Smells and refactorings for microservices security: a multivocal literature review. J. Syst. Softw. 192, 111393 (2022). https:\/\/doi.org\/10.1016\/j.jss.2022.111393","journal-title":"J. Syst. Softw."},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MS.2015.11","volume":"32","author":"J Th\u00f6nes","year":"2015","unstructured":"Th\u00f6nes, J.: Microservices. IEEE Softw. 32(1), 116\u2013116 (2015). https:\/\/doi.org\/10.1109\/MS.2015.11","journal-title":"IEEE Softw."},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Zimmermann, O.: Microservices tenets. Comput. Sci. Res. Dev. 32(3), 301\u2013310 (2017). https:\/\/doi.org\/10.1007\/s00450-016-0337-0","DOI":"10.1007\/s00450-016-0337-0"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16697-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T23:16:51Z","timestamp":1663197411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16697-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031166969","9783031166976"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16697-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ecsa-2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}