{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:07:46Z","timestamp":1772449666859,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819699131","type":"print"},{"value":"9789819699148","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9914-8_22","type":"book-chapter","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T14:23:54Z","timestamp":1752675834000},"page":"257-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Automated Cloud-Native Dynamic Network Policy Generation Based on Microservices Topology"],"prefix":"10.1007","author":[{"given":"Weiqiang","family":"Huang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junling","family":"You","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingguo","family":"Ge","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He","family":"Kong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liangxiong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"key":"22_CR1","unstructured":"Lewis, J., Fowler, M.: Microservices, April 2014. http:\/\/martinfowler.com\/articles\/microservices.html. Accessed 25 Sept 2022"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Dragoni, N., et al.: Microservices: yesterday, today, and tomorrow. In: Present and Ulterior Software Engineering, pp. 195\u2013216 (2017)","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"22_CR3","unstructured":"CVE Feed: CVE Feed (2022). https:\/\/kubernetes.io\/docs\/reference\/issues-security. Accessed 10 Aug 2023"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Lee, S., Nam, J.: Kunerva: automated network policy discovery framework for containers. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3310281"},{"key":"22_CR5","unstructured":"Tigera: About Calico. https:\/\/docs.tigera.io\/calico\/latest\/about. Accessed 10 Aug 2023"},{"key":"22_CR6","unstructured":"Isovalent: Cilium. https:\/\/docs.cilium.io\/en\/stable\/. Accessed 10 Aug 2023"},{"key":"22_CR7","unstructured":"Michael, B., Vinu, C.: How we built a metering and chargeback system to incentivize higher resource utilization of twitter infrastructure (2016)"},{"key":"22_CR8","unstructured":"Ghavamnia, S., Palit, T., Benameur, A., Polychronakis, M.: Confine: automated system call policy generation for container attack surface reduction. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 443\u2013458 (2020)"},{"key":"22_CR9","unstructured":"Li, X., Chen, Y., Lin, Z., Wang, X., Chen, J.H.: Automatic policy generation for inter-service access control of microservices. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3971\u20133988 (2021)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Xu, S., et al.: Log2Policy: an approach to generate fine-grained access control rules for microservices from scratch. In: Proceedings of the 39th Annual Computer Security Applications Conference, pp. 229\u2013240 (2023)","DOI":"10.1145\/3627106.3627137"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Xiang, C., et al.: Towards continuous access control validation and forensics. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 113\u2013129 (2019)","DOI":"10.1145\/3319535.3363191"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Shamim, M.S.I., Bhuiyan, F.A., Rahman, A.: XI commandments of Kubernetes security: a systematization of knowledge related to Kubernetes security practices. In: 2020 IEEE Secure Development (SecDev), pp. 58\u201364 (2020)","DOI":"10.1109\/SecDev45635.2020.00025"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Bose, D.B., Rahman, A., Shamim, S.I.: \u2018Under-reported\u2019 security defects in Kubernetes manifests. In: 2021 IEEE\/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), pp. 9\u201312. IEEE (2021)","DOI":"10.1109\/EnCyCriS52570.2021.00009"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Haque, M.U., Kholoosi, M.M., Babar, M.A.: KGSecConfig: a knowledge graph based approach for secured container orchestrator configuration. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 420\u2013431. IEEE (2022)","DOI":"10.1109\/SANER53432.2022.00057"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TNSM.2022.3201095","volume":"20","author":"M Elsaadawy","year":"2022","unstructured":"Elsaadawy, M., Younis, M., Wang, J., Hou, X., Kemme, B.: Dynamic application call graph formation and service identification in cloud data centers. IEEE Trans. Netw. Serv. Manage. 20(1), 261\u2013275 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TNSM.2004.4798290","volume":"1","author":"MK Agarwal","year":"2004","unstructured":"Agarwal, M.K., Gupta, M., Kar, G., Neogi, A., Sailer, A.: Mining activity data for dynamic dependency discovery in E-business systems. IEEE Trans. Netw. Serv. Manage. 1(2), 49\u201358 (2004)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Blaise, A., Rebecchi, F.: Stay at the Helm: secure Kubernetes deployments via graph generation and attack reconstruction. In: 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), pp. 59\u201369. IEEE (2022)","DOI":"10.1109\/CLOUD55607.2022.00022"},{"key":"22_CR18","unstructured":"CNCF: Helm Charts. https:\/\/helm.sh\/. Accessed 10 Aug 2023"},{"key":"22_CR19","volume-title":"Microservice Patterns","author":"C Richardson","year":"2019","unstructured":"Richardson, C.: Microservice Patterns. Manning Publications, New York, NY (2019)"},{"key":"22_CR20","unstructured":"Cilium: High Performance Cloud Native Networking (CNI), May 2021. https:\/\/cilium.io\/use-cases\/cni\/. Accessed 29 Dec 2023"},{"key":"22_CR21","unstructured":"Istio: Bookinfo Application. https:\/\/istio.io\/latest\/docs\/examples\/bookinfo\/. Accessed 10 Aug 2023"},{"key":"22_CR22","unstructured":"Google Cloud Platform: Online Boutique. https:\/\/github.com\/GoogleCloudPlatform\/microservices-demo. Accessed 10 Aug 2023"},{"key":"22_CR23","unstructured":"Weaveworks: Microservices Demo: Sock Shop. https:\/\/github.com\/microservices-demo\/microservices-demo. Accessed 10 Aug 2023"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9914-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:39:57Z","timestamp":1772447997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9914-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819699131","9789819699148"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9914-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}