{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T05:06:49Z","timestamp":1748063209733,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031368882"},{"type":"electronic","value":"9783031368899"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36889-9_23","type":"book-chapter","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T21:01:50Z","timestamp":1689454910000},"page":"337-352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Microservices Security: Bad vs. Good Practices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6411-0511","authenticated-orcid":false,"given":"Francisco","family":"Ponce","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2435-3543","authenticated-orcid":false,"given":"Jacopo","family":"Soldani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6487-5813","authenticated-orcid":false,"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2048-2468","authenticated-orcid":false,"given":"Antonio","family":"Brogi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,16]]},"reference":[{"key":"23_CR1","unstructured":"Abasi, F.: Securing modern API- and microservices-based apps by design. IBM Developer (2019). https:\/\/ibm.co\/3y8XS0n"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/0013188032000133548","volume":"45","author":"T Basit","year":"2003","unstructured":"Basit, T.: Manual or electronic? The role of coding in qualitative data analysis. Educ. Res. 45(2), 143\u2013154 (2003). https:\/\/doi.org\/10.1080\/0013188032000133548","journal-title":"Educ. Res."},{"key":"23_CR3","unstructured":"Behrens, S., Payne, B.: Starting the avalanche: Application DDoS in microservice architectures. The Netflix Tech Blog (2017). https:\/\/bit.ly\/3N80u2H"},{"key":"23_CR4","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.779","volume":"8","author":"D Berardi","year":"2022","unstructured":"Berardi, D., Giallorenzo, S., Mauro, J., Melis, A., Montesi, F., Prandini, M.: Microservice security: a systematic literature review. PeerJ Comput. Sci. 8, e779 (2022). https:\/\/doi.org\/10.7717\/peerj-cs.779","journal-title":"PeerJ Comput. Sci."},{"key":"23_CR5","unstructured":"Boersma, E.: Top 10 security traps to avoid when migrating from a monolith to microservices. Sqreen (2019). https:\/\/bit.ly\/3QBqlD1"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Budko, R.: Five things you need to know about API security. The New Stack (2018). https:\/\/bit.ly\/3NdfRXA","DOI":"10.12968\/S1356-9252(22)40104-3"},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Carrasco, A., Bladel, B.v., Demeyer, S.: Migrating towards microservices: migration and architecture smells. In: Proceedings of the 2nd International Workshop on Refactoring. IWoR 2018, p. 1\u20136. ACM (2018). https:\/\/doi.org\/10.1145\/3242163.3242164","DOI":"10.1145\/3242163.3242164"},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Chandramouli, R.: Security strategies for microservices-based application systems. NIST SP 800-204 (2019). https:\/\/doi.org\/10.6028\/NIST.SP.800-204","DOI":"10.6028\/NIST.SP.800-204"},{"key":"23_CR9","unstructured":"da Silva, R.: Best practices to protect your microservices architecture. Medium (2019). https:\/\/bit.ly\/3HUrxO9x"},{"key":"23_CR10","unstructured":"Edureka: microservices security: best practices to secure microservicess (2019). https:\/\/youtu.be\/wpA0N7kHaDo"},{"issue":"5","key":"23_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCC.2016.105","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito, C., Castiglione, A., Choo, K.: Challenges in delivering software in the cloud as microservices. IEEE Cloud Comput. 3(5), 10\u201314 (2016). https:\/\/doi.org\/10.1109\/MCC.2016.105","journal-title":"IEEE Cloud Comput."},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2018.09.006","volume":"106","author":"V Garousi","year":"2019","unstructured":"Garousi, V., Felderer, M., Mantyla, M.V.: Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. Inf. Softw. Technol. 106, 101\u2013121 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2018.09.006","journal-title":"Inf. Softw. Technol."},{"key":"23_CR13","unstructured":"Gupta, N.: Security strategies for DevOps, APIs, containers and microservices. Imperva (2018). https:\/\/bit.ly\/3y8lBO5"},{"key":"23_CR14","volume-title":"Microservices Best Practices for Java","author":"M Hofmann","year":"2016","unstructured":"Hofmann, M., Schnabel, E., Stanley, K.: Microservices Best Practices for Java. IBM Redbooks, New York (2016)"},{"key":"23_CR15","unstructured":"IETF OAuth Working Group: Open Authorization (OAuth), version 2.0 (2012). https:\/\/oauth.net\/2\/"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-1-4842-3858-5_11","volume-title":"Microservices for the Enterprise","author":"K Indrasiri","year":"2018","unstructured":"Indrasiri, K., Siriwardena, P.: Microservices security fundamentals. In: Microservices for the Enterprise, pp. 313\u2013345. Apress, Berkeley, CA (2018). https:\/\/doi.org\/10.1007\/978-1-4842-3858-5_11"},{"key":"23_CR17","volume-title":"Building Microservices with Go","author":"N Jackson","year":"2017","unstructured":"Jackson, N.: Building Microservices with Go. Packt Publishing, Birmingham (2017)"},{"key":"23_CR18","unstructured":"Jain, C.: Top 10 security best practices to secure your microservices. AppSecUSA 2017, OWASP (2018). https:\/\/youtu.be\/VtUQINsYXDM"},{"key":"23_CR19","unstructured":"Kamaruzzaman, M.: Microservice architecture and its 10 most important design patterns. Towards Data Science (2020). https:\/\/bit.ly\/3n5Lsjo"},{"key":"23_CR20","unstructured":"Kanjilal, J.: 4 fundamental microservices security best practices. SearchAppArchitecture (2020). https:\/\/bit.ly\/39DloJc"},{"key":"23_CR21","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01 (2007)"},{"key":"23_CR22","volume-title":"Content Analysis: An Introduction to its Methodology","author":"K Krippendorff","year":"2004","unstructured":"Krippendorff, K.: Content Analysis: An Introduction to its Methodology, 2nd edn. Sage Publications, Thousand Oaks (2004)","edition":"2"},{"key":"23_CR23","unstructured":"Krishnamurthy, T.: Transition to microservice architecture - challenges. BeingTechie (2018). https:\/\/bit.ly\/3N9SiPB"},{"key":"23_CR24","unstructured":"Lea, G.: Microservices security: all the questions you should be asking (2015). https:\/\/bit.ly\/3HEGbbQ"},{"key":"23_CR25","unstructured":"Lemos, R.: App security in the microservices age: 4 best practices. TechBeacon (2019). https:\/\/bit.ly\/3HIu9i0"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Mao, R., et al.: Preliminary findings about DevSecOps from grey literature. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), pp. 450\u2013457. IEEE (2020). https:\/\/doi.org\/10.1109\/QRS51102.2020.00064","DOI":"10.1109\/QRS51102.2020.00064"},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Mateus-Coelho, N., Cruz-Cunha, M., Ferreira, L.G.: Security in microservices architectures. In: CENTERIS\/ProjMAN\/HCist, Procedia Computer Science, pp. 1\u201312. Elsevier (2020). https:\/\/doi.org\/10.1016\/j.procs.2021.01.320","DOI":"10.1016\/j.procs.2021.01.320"},{"key":"23_CR28","unstructured":"Matteson, S.: 10 tips for securing microservice architecture. TechRepublic (2017). https:\/\/tek.io\/3xL16pa"},{"key":"23_CR29","unstructured":"Matteson, S.: How to establish strong microservices security using SSL, TLS, and API gateways. TechRepublic (2017). https:\/\/tek.io\/3nnr9hH"},{"key":"23_CR30","volume-title":"Securing Microservices APIs","author":"M McLarty","year":"2018","unstructured":"McLarty, M., Wilson, R., Morrison, S.: Securing Microservices APIs. O\u2019Reilly, Springfield (2018)"},{"key":"23_CR31","unstructured":"Mody, V.: From zero to zero trust. Teleport (2020). https:\/\/bit.ly\/3N8PVwl"},{"issue":"1","key":"23_CR32","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MITP.2018.2876987","volume":"21","author":"A Nehme","year":"2019","unstructured":"Nehme, A., Jesus, V., Mahbub, K., Abdallah, A.: Securing microservices. IT Prof. 21(1), 42\u201349 (2019). https:\/\/doi.org\/10.1109\/MITP.2018.2876987","journal-title":"IT Prof."},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"Neri, D., Soldani, J., Zimmermann, O., Brogi, A.: Design principles, architectural smells and refactorings for microservices: a multivocal review. SICS Softw.-Intensiv. Cyber-Phys. Syst. 35(1), 3\u201315 (2020). https:\/\/doi.org\/10.1007\/s00450-019-00407-8","DOI":"10.1007\/s00450-019-00407-8"},{"key":"23_CR34","volume-title":"Building Microservices","author":"S Newman","year":"2015","unstructured":"Newman, S.: Building Microservices. O\u2019Reilly, Springfield (2015)"},{"key":"23_CR35","unstructured":"O\u2019Neill, L.: Microservice security - what you need to know. CrashTest Security (2020). https:\/\/bit.ly\/3tPXUaK"},{"key":"23_CR36","unstructured":"OpenID: Openid connect (2014). https:\/\/openid.net\/connect\/"},{"key":"23_CR37","unstructured":"Parecki, A.: OAuth: When things go wrong. Okta Developer (2019). https:\/\/www.youtube.com\/watch?v=H6MxsFMAoP8"},{"key":"23_CR38","doi-asserted-by":"publisher","first-page":"102200","DOI":"10.1016\/j.cose.2021.102200","volume":"103","author":"A Pereira-Vale","year":"2021","unstructured":"Pereira-Vale, A., Fernandez, E.B., Monge, R., Astudillo, H., M\u00e1rquez, G.: Security in microservice-based systems: a multivocal literature review. Comput. Secur. 103, 102200 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102200","journal-title":"Comput. Secur."},{"key":"23_CR39","unstructured":"Poddar, N.: Simplifying microservices security with a service mesh. Cloud Native Computing Foundation, Webinar (2019). https:\/\/youtu.be\/Ai8HlkI7Mm4"},{"key":"23_CR40","doi-asserted-by":"publisher","unstructured":"Ponce, F., Soldani, J., Astudillo, H., Brogi, A.: Should microservice security smells stay or be refactored? towards a trade-off analysis. In: Gerostathopoulos, I., Lewis, G., Batista, T., Bure\u0161, T. (eds.) Software Architecture. ECSA 2022. Lecture Notes in Computer Science, vol. 13444, pp. 131\u2013139. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16697-6_9","DOI":"10.1007\/978-3-031-16697-6_9"},{"key":"23_CR41","doi-asserted-by":"publisher","first-page":"111393","DOI":"10.1016\/j.jss.2022.111393","volume":"192","author":"F Ponce","year":"2022","unstructured":"Ponce, F., Soldani, J., Astudillo, H., Brogi, A.: Smells and refactorings for microservices security: a multivocal literature review. J. Syst. Softw. 192, 111393 (2022). https:\/\/doi.org\/10.1016\/j.jss.2022.111393","journal-title":"J. Syst. Softw."},{"key":"23_CR42","unstructured":"Radware: microservice architectures challenge traditional security practices (2020). https:\/\/bit.ly\/3n4N393"},{"key":"23_CR43","unstructured":"Raible, M.: 11 patterns to secure microservice architectures. DZone (2020). https:\/\/bit.ly\/3tPQoNf"},{"key":"23_CR44","unstructured":"Raible, M.: Security patterns for microservice architectures. Okta Developer (2020). https:\/\/bit.ly\/3tLMc0D"},{"key":"23_CR45","unstructured":"Sahni, V.: Best practices for building a microservice architecture. Vinay Sahni (2019). https:\/\/bit.ly\/2UTHLNS"},{"key":"23_CR46","unstructured":"Sass, R.: Security in the world of microservices. ITProPortal (2017). https:\/\/bit.ly\/3HIbFhe"},{"key":"23_CR47","doi-asserted-by":"publisher","unstructured":"Siriwardena, P.: Mutual authentication with TLS, pp. 47\u201358. Apress (2014). https:\/\/doi.org\/10.1007\/978-1-4302-6817-8_4","DOI":"10.1007\/978-1-4302-6817-8_4"},{"key":"23_CR48","unstructured":"Siriwardena, P.: Microservices security landscape. WSO2 Integration Summit 2019 (2019). https:\/\/youtu.be\/6jGePTpbgtI"},{"key":"23_CR49","unstructured":"Siriwardena, P.: Challenges of securing microservices. Medium (2020). https:\/\/bit.ly\/3tRyF7T"},{"key":"23_CR50","unstructured":"Siriwardena, P., Dias, N.: Microservices security in action. Manning (2020)"},{"key":"23_CR51","unstructured":"Smith, T.: How to secure APIs. DZone (2019). https:\/\/bit.ly\/3QyusQh"},{"key":"23_CR52","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jss.2018.09.082","volume":"146","author":"J Soldani","year":"2018","unstructured":"Soldani, J., Tamburri, D.A., Van Den Heuvel, W.J.: The pains and gains of microservices: a systematic grey literature review. J. Syst. Softw. 146, 215\u2013232 (2018). https:\/\/doi.org\/10.1016\/j.jss.2018.09.082","journal-title":"J. Syst. Softw."},{"key":"23_CR53","unstructured":"SumoLogic: improving security in your microservices architecture (2019). https:\/\/bit.ly\/3zSSXls"},{"issue":"3","key":"23_CR54","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2018.2141031","volume":"35","author":"D Taibi","year":"2018","unstructured":"Taibi, D., Lenarduzzi, V.: On the definition of microservice bad smells. IEEE Softw. 35(3), 56\u201362 (2018). https:\/\/doi.org\/10.1109\/MS.2018.2141031","journal-title":"IEEE Softw."},{"key":"23_CR55","doi-asserted-by":"publisher","unstructured":"Taibi, D., Lenarduzzi, V., Pahl, C.: Architectural patterns for microservices: a systematic mapping study. In: Proceedings of the 8th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, pp. 221\u2013232. SciTePress (2018). https:\/\/doi.org\/10.5220\/0006798302210232","DOI":"10.5220\/0006798302210232"},{"key":"23_CR56","doi-asserted-by":"publisher","unstructured":"Torkura, K.A., Sukmana, M.I., Kayem, A.V., Cheng, F., Meinel, C.: A cyber risk based moving target defense mechanism for microservice architectures. In: 2018 IEEE ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom, pp. 932\u2013939. IEEE (2018). https:\/\/doi.org\/10.1109\/BDCloud.2018.00137","DOI":"10.1109\/BDCloud.2018.00137"},{"key":"23_CR57","unstructured":"Troisi, M.: 8 best practices for microservices app sec. TechBeacon (2017). https:\/\/bit.ly\/3HDgDvZ"},{"key":"23_CR58","unstructured":"Wallarm: A CISO\u2019s guide to cloud application security (2019). https:\/\/bit.ly\/3QAQKB6"},{"key":"23_CR59","unstructured":"Wallarm: moving to microservices with security in mind (2019). https:\/\/bit.ly\/3HItMnC"},{"key":"23_CR60","unstructured":"Wichers, D., Williams, J.: Owasp top-10 2017. OWASP Foundation (2017)"},{"key":"23_CR61","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic Publishers, Alphen aan den Rijn (2000)"},{"key":"23_CR62","volume-title":"Microservices: Flexible Software Architecture","author":"E Wolff","year":"2016","unstructured":"Wolff, E.: Microservices: Flexible Software Architecture. O\u2019Reilly, Springfield (2016)"},{"key":"23_CR63","doi-asserted-by":"publisher","unstructured":"Yarygina, T., Bagge, A.: Overcoming security challenges in microservice architectures. In: 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 11\u201320. IEEE (2018). https:\/\/doi.org\/10.1109\/SOSE.2018.00011","DOI":"10.1109\/SOSE.2018.00011"},{"key":"23_CR64","volume-title":"Python Microservices Development","author":"T Ziade","year":"2017","unstructured":"Ziade, T.: Python Microservices Development. Packt Publishing, Birmingham (2017)"}],"container-title":["Lecture Notes in Computer Science","Software Architecture. ECSA 2022 Tracks and Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36889-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T21:04:05Z","timestamp":1689455045000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36889-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031368882","9783031368899"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36889-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ecsa-2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 tutorial papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}