{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:35:12Z","timestamp":1742927712800,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031617522"},{"type":"electronic","value":"9783031617539"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61753-9_3","type":"book-chapter","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T08:02:39Z","timestamp":1716451359000},"page":"29-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model-Driven Security Smell Resolution in\u00a0Microservice Architecture Using LEMMA"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3588-5174","authenticated-orcid":false,"given":"Philip","family":"Wizenty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6411-0511","authenticated-orcid":false,"given":"Francisco","family":"Ponce","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0784-9245","authenticated-orcid":false,"given":"Florian","family":"Rademacher","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2435-3543","authenticated-orcid":false,"given":"Jacopo","family":"Soldani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6487-5813","authenticated-orcid":false,"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2048-2468","authenticated-orcid":false,"given":"Antonio","family":"Brogi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1343-3553","authenticated-orcid":false,"given":"Sabine","family":"Sachweh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Arcelli, D., Cortellessa, V., Pompeo, D.D.: Automating performance antipattern detection and software refactoring in UML models. In: Wang, X., Lo, D., Shihab, E. (eds.) 2019 International Conference on Software Analysis, Evolution and Reengineering, SANER 2019, pp. 639\u2013643. IEEE Computer Society (2019)","DOI":"10.1109\/SANER.2019.8667967"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Arcelli Fontana, F., et al.: Arcan: a tool for architectural smells detection. In: Malavolta, I., Capilla, R. (eds.) 2017 IEEE International Conference on Software Architecture Workshops, ICSA 2017 Workshops, pp. 282\u2013285. IEEE Computer Society (2017)","DOI":"10.1109\/ICSAW.2017.16"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2016.64","volume":"33","author":"A Balalaie","year":"2016","unstructured":"Balalaie, A., Heydarnoori, A., Jamshidi, P.: Microservices architecture enables DevOps: migration to a cloud-native architecture. IEEE Softw. 33(3), 42\u201352 (2016)","journal-title":"IEEE Softw."},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Balalaie, A., Heydarnoori, A., Jamshidi, P., Tamburri, D.A., Lynn, T.: Microservices migration patterns. Softw. Pract. Experience 48(11), 2019\u20132042 (2018). https:\/\/doi.org\/10.1002\/spe.2608","DOI":"10.1002\/spe.2608"},{"key":"3_CR5","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional (2012)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bogner, J., Fritzsch, J., Wagner, S., Zimmermann, A.: Microservices in industry: insights into technologies, characteristics, and software quality. In: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), pp. 187\u2013195. IEEE (2019)","DOI":"10.1109\/ICSA-C.2019.00041"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Combemale, B., France, R.B., J\u00e9z\u00e9quel, J.M., Rumpe, B., Steel, J., Vojtisek, D.: Engineering Modeling Languages: Turning Domain Knowledge into Tools, 1st edn. CRC Press (2017)","DOI":"10.1201\/b21841"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Di Francesco, P., Lago, P., Malavolta, I.: Migrating towards microservice architectures: an industrial survey. In: 2018 IEEE International Conference on Software Architecture (ICSA), pp. 29\u201338. IEEE (2018)","DOI":"10.1109\/ICSA.2018.00012"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Garcia, J., Popescu, D., Edwards, G., Medvidovic, N.: Identifying architectural bad smells. In: Winter, A., Ferenc, R., Knodel, J. (eds.) Proceedings of the 2009 European Conference on Software Maintenance and Reengineering, CSMR 2009, pp. 255\u2013258. IEEE Computer Society, USA (2009). https:\/\/doi.org\/10.1109\/CSMR.2009.59","DOI":"10.1109\/CSMR.2009.59"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Granchelli, G., Cardarelli, M., Francesco, P.D., Malavolta, I., Iovino, L., Salle, A.D.: Towards recovering the software architecture of microservice-based systems. In: 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), pp. 46\u201353. IEEE (2017)","DOI":"10.1109\/ICSAW.2017.48"},{"issue":"4","key":"3_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/54289.871709","volume":"22","author":"N Hardy","year":"1988","unstructured":"Hardy, N.: The confused deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Syst. Rev. 22(4), 36\u201338 (1988)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-65831-5_11","volume-title":"Software Architecture","author":"S Haselb\u00f6ck","year":"2017","unstructured":"Haselb\u00f6ck, S., Weinreich, R., Buchgeher, G.: Decision models for microservices: design areas, stakeholders, use cases, and requirements. In: Lopes, A., de Lemos, R. (eds.) ECSA 2017. LNCS, vol. 10475, pp. 155\u2013170. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65831-5_11"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Hassan, S., Ali, N., Bahsoon, R.: Microservice ambients: an architectural meta-modelling approach for microservice granularity. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/ICSA.2017.32"},{"key":"3_CR14","unstructured":"JHipster: JHipster Domain Language (JDL) (2023). https:\/\/www.jhipster.tech\/jdl\/intro"},{"key":"3_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-64846-6_11","volume-title":"Service-Oriented Computing","author":"S Kapferer","year":"2020","unstructured":"Kapferer, S., Zimmermann, O.: Domain-driven service design. In: Dustdar, S. (ed.) SummerSOC 2020. CCIS, vol. 1310, pp. 189\u2013208. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64846-6_11"},{"key":"3_CR16","unstructured":"Knoche, H., Hasselbring, W.: Drivers and barriers for microservice adoption \u2013 a survey among professionals in Germany. Enterp. Model. Inf. Syst. Archit. 14(1), 1\u201335 (2019)"},{"key":"3_CR17","unstructured":"Morris, K.: Infrastructure as Code. O\u2019Reilly Media (2020)"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00450-019-00407-8","volume":"35","author":"D Neri","year":"2020","unstructured":"Neri, D., Soldani, J., Zimmermann, O., Brogi, A.: Design principles, architectural smells and refactorings for microservices: a multivocal review. SICS Softw.-Intensive Cyber-Phys. Syst. 35(1), 3\u201315 (2020). https:\/\/doi.org\/10.1007\/s00450-019-00407-8","journal-title":"SICS Softw.-Intensive Cyber-Phys. Syst."},{"key":"3_CR19","unstructured":"Newman, S.: Building Microservices: Designing Fine-Grained Systems. O\u2019Reilly (2015)"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Pigazzini, I., Fontana, F.A., Lenarduzzi, V., Taibi, D.: Towards microservice smells detection. In: Proceedings of the 3rd International Conference on Technical Debt, TechDebt 2020, pp. 92\u201397. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3387906.3388625","DOI":"10.1145\/3387906.3388625"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Ponce, F., Soldani, J., Astudillo, H., Brogi, A.: Should microservice security smells stay or be refactored? Towards a trade-off analysis. In: Gerostathopoulos, I., et\u00a0al. (eds.) Software Architecture, ECSA 2022. LNCS, vol. 13444, pp. 131\u2013139. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16697-6_9","DOI":"10.1007\/978-3-031-16697-6_9"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Ponce, F., Soldani, J., Astudillo, H., Brogi, A.: Smells and refactorings for microservices security: a multivocal literature review. J. Syst. Softw. 192, 111393 (2022). https:\/\/doi.org\/10.1016\/j.jss.2022.111393","DOI":"10.1016\/j.jss.2022.111393"},{"key":"3_CR23","unstructured":"Rademacher, F.: A Language Ecosystem for Modeling Microservice Architecture. Ph.D. thesis, University of Kassel (2022)"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Rademacher, F., Sachweh, S., Z\u00fcndorf, A.: Deriving microservice code from underspecified domain models using DevOps-enabled modeling languages and model transformations. In: 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 229\u2013236. IEEE (2020).https:\/\/doi.org\/10.1109\/SEAA51224.2020.00047","DOI":"10.1109\/SEAA51224.2020.00047"},{"key":"3_CR25","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-49418-6_21","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"F Rademacher","year":"2020","unstructured":"Rademacher, F., Sachweh, S., Z\u00fcndorf, A.: A modeling method for systematic architecture reconstruction of microservice-based software systems. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 311\u2013326. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_21"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Rahman, A., Parnin, C., Williams, L.: The seven sins: security smells in infrastructure as code scripts. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 164\u2013175 (2019). https:\/\/doi.org\/10.1109\/ICSE.2019.00033","DOI":"10.1109\/ICSE.2019.00033"},{"key":"3_CR27","unstructured":"Richardson, C.: Microservices Patterns. Manning Publications (2019)"},{"key":"3_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-15201-1_10","volume-title":"Software Engineering and Formal Methods","author":"A Sanchez","year":"2015","unstructured":"Sanchez, A., Barbosa, L.S., Madeira, A.: Modelling and verifying smell-free architectures with the Archery language. In: Canal, C., Idani, A. (eds.) SEFM 2014. LNCS, vol. 8938, pp. 147\u2013163. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15201-1_10"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Soldani, J., Muntoni, G., Neri, D., Brogi, A.: The $$\\mu $$TOSCA toolchain: mining, analyzing, and refactoring microservice-based architectures. Softw. Pract. Experience 51(7), 1591\u20131621 (2021). https:\/\/doi.org\/10.1002\/spe.2974","DOI":"10.1002\/spe.2974"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Soldani, J., Tamburri, D.A., Heuvel, W.J.V.D.: The pains and gains of microservices: a systematic grey literature review. J. Syst. Softw. 146, 215\u2013232 (2018)","DOI":"10.1016\/j.jss.2018.09.082"},{"issue":"6","key":"3_CR31","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s42979-021-00825-z","volume":"2","author":"J Sorgalla","year":"2021","unstructured":"Sorgalla, J., Wizenty, P., Rademacher, F., Sachweh, S., Z\u00fcndorf, A.: Applying model-driven engineering to stimulate the adoption of DevOps processes in small and medium-sized development organizations: the case for microservice architecture. SN Comput. Sci. 2(6), 459 (2021)","journal-title":"SN Comput. Sci."},{"issue":"3","key":"3_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2018.2141031","volume":"35","author":"D Taibi","year":"2018","unstructured":"Taibi, D., Lenarduzzi, V.: On the definition of microservice bad smells. IEEE Softw. 35(3), 56\u201362 (2018). https:\/\/doi.org\/10.1109\/MS.2018.2141031","journal-title":"IEEE Softw."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Taibi, D., Lenarduzzi, V., Pahl, C.: Microservices anti-patterns: a taxonomy. Microserv. Sci. Eng., 111\u2013128 (2020)","DOI":"10.1007\/978-3-030-31646-4_5"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Terzi\u0107, B., Dimitrieski, V., Kordi\u0107, S., Milosavljevi\u0107, G., Lukovi\u0107, I.: Development and evaluation of MicroBuilder: a model-driven tool for the specification of REST microservice software architectures. Enterp. Inf. Syst. 12(8\u20139), 1034\u20131057 (2018)","DOI":"10.1080\/17517575.2018.1460766"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Vidal, S., Vazquez, H., Diaz-Pace, J.A., Marcos, C., Garcia, A., Oizumi, W.: JSpIRIT: a flexible tool for the analysis of code smells. In: Mar\u00edn, B., Soto, R. (eds.) 34th International Conference of the Chilean Computer Science Society, SCCC 2015, pp.\u00a01\u20136. IEEE Computer Society (2015)","DOI":"10.1109\/SCCC.2015.7416572"},{"key":"3_CR36","doi-asserted-by":"publisher","unstructured":"Wizenty., P., et al.: Towards resolving security smells in microservices, model-driven. In: Proceedings of the 18th International Conference on Software Technologies - ICSOFT, INSTICC, pp. 15\u201326. SciTePress (2023). https:\/\/doi.org\/10.5220\/0012049800003538","DOI":"10.5220\/0012049800003538"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61753-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T22:02:33Z","timestamp":1735250553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61753-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031617522","9783031617539"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61753-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOFT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoft2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}