{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:32:18Z","timestamp":1768516338977,"version":"3.49.0"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03982-3","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T11:03:17Z","timestamp":1626260597000},"page":"2937-2987","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Kubernetes in IT administration and serverless computing: An empirical study and research challenges"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0008-7797","authenticated-orcid":false,"given":"Subrota Kumar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Rui","family":"Pan","sequence":"additional","affiliation":[]},{"given":"H M Dipu","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Tan","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"3982_CR1","doi-asserted-by":"crossref","unstructured":"Naik N (2016) Building a virtual system of systems using docker swarm in multiple clouds. In: 2016 IEEE International Symposium on Systems Engineering (ISSE), IEEE, pp 1\u20133","DOI":"10.1109\/SysEng.2016.7753148"},{"issue":"7","key":"3982_CR2","doi-asserted-by":"publisher","first-page":"2956","DOI":"10.1007\/s11227-018-2345-2","volume":"74","author":"C Guerrero","year":"2018","unstructured":"Guerrero C, Lera I, Juiz C (2018) Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications. The Journal of Supercomputing 74(7):2956\u20132983","journal-title":"The Journal of Supercomputing"},{"key":"3982_CR3","doi-asserted-by":"crossref","unstructured":"C\u00e9rin C, Menouer T, Saad W, Abdallah WB (2017) A new docker swarm scheduling strategy. In: 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2), IEEE, pp 112\u2013117","DOI":"10.1109\/SC2.2017.24"},{"key":"3982_CR4","unstructured":"Soppelsa F, Kaewkasi C (2016) Native docker clustering with swarm. Packt Publishing Ltd"},{"issue":"1","key":"3982_CR5","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2898442.2898444","volume":"14","author":"B Burns","year":"2016","unstructured":"Burns B, Grant B, Oppenheimer D, Brewer E, Wilkes J (2016) Borg, omega, and kubernetes: lessons learned from three container-management systems over a decade. Queue 14(1):70\u201393","journal-title":"Queue"},{"issue":"3","key":"3982_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MCC.2014.51","volume":"1","author":"D Bernstein","year":"2014","unstructured":"Bernstein D (2014) Containers and cloud: from lxc to docker to kubernetes. IEEE Cloud Computing 1(3):81\u201384","journal-title":"IEEE Cloud Computing"},{"key":"3982_CR7","doi-asserted-by":"crossref","unstructured":"Ifrah S (2019) Deploy a containerized application with amazon EKS. In: Deploy Containers on AWS, Springer, pp 135\u2013173","DOI":"10.1007\/978-1-4842-5101-0_4"},{"key":"3982_CR8","doi-asserted-by":"crossref","unstructured":"Bisong E (2019) Containers and google kubernetes engine. In: Building Machine Learning and Deep Learning Models on Google Cloud Platform, Springer, pp 655\u2013670","DOI":"10.1007\/978-1-4842-4470-8_45"},{"key":"3982_CR9","doi-asserted-by":"crossref","unstructured":"Ifrah S (2021) Deploy containerized applications with google kubernetes engine (GKE). In: Getting Started with Containers in Google Cloud Platform, Springer, pp 105\u2013135","DOI":"10.1007\/978-1-4842-6470-6_4"},{"key":"3982_CR10","volume-title":"Introducing Azure Kubernetes Service","author":"C Orchestration","year":"2019","unstructured":"Orchestration C, Buchanan S, Rangama J, Bellavance N (2019) Introducing Azure Kubernetes Service. Springer, Berline"},{"key":"3982_CR11","doi-asserted-by":"crossref","unstructured":"Baldini I, Castro P, Chang K, Cheng P, Fink S, Ishakian V, Mitchell N, Muthusamy V, Rabbah R, Slominski A, et\u00a0al. (2017) Serverless computing: current trends and open problems. In: Research Advances in Cloud Computing, Springer, pp 1\u201320","DOI":"10.1007\/978-981-10-5026-8_1"},{"key":"3982_CR12","doi-asserted-by":"crossref","unstructured":"Mohanty SK, Premsankar G, Di\u00a0Francesco M, et\u00a0al. (2018) An evaluation of open source serverless computing frameworks. In: CloudCom, pp 115\u2013120","DOI":"10.1109\/CloudCom2018.2018.00033"},{"key":"3982_CR13","doi-asserted-by":"crossref","unstructured":"Back T, Andrikopoulos V (2018) Using a microbenchmark to compare function as a service solutions. In: European Conference on Service-Oriented and Cloud Computing, Springer, pp 146\u2013160","DOI":"10.1007\/978-3-319-99819-0_11"},{"key":"3982_CR14","unstructured":"Fox GC, Ishakian V, Muthusamy V, Slominski A (2017) Status of serverless computing and function-as-a-service (faas) in industry and research. arXiv preprint arXiv:170808028"},{"key":"3982_CR15","doi-asserted-by":"crossref","unstructured":"Shahrad M, Balkind J, Wentzlaff D (2019) Architectural implications of function-as-a-service computing. In: Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture, pp 1063\u20131075","DOI":"10.1145\/3352460.3358296"},{"issue":"12","key":"3982_CR16","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier B (1999) Attack trees. Dr Dobb\u2019s journal 24(12):21\u201329","journal-title":"Dr Dobb\u2019s journal"},{"key":"3982_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183631","volume-title":"Secrets and lies: digital security in a networked world","author":"B Schneier","year":"2015","unstructured":"Schneier B (2015) Secrets and lies: digital security in a networked world. Wiley, NewYork"},{"issue":"1","key":"3982_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2014","unstructured":"Kordy B, Mauw S, Radomirovi\u0107 S, Schweitzer P (2014) Attack-defense trees. J Logic Comput 24(1):55\u201387","journal-title":"J Logic Comput"},{"key":"3982_CR19","doi-asserted-by":"crossref","unstructured":"Audinot M, Pinchinat S, Kordy B (2017) Is my attack tree correct? In: European Symposium on Research in Computer Security, Springer, pp 83\u2013102","DOI":"10.1007\/978-3-319-66402-6_7"},{"issue":"8","key":"3982_CR20","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1002\/sec.299","volume":"5","author":"A Roy","year":"2012","unstructured":"Roy A, Kim DS, Trivedi KS (2012) Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Security Commun Netw 5(8):929\u2013943","journal-title":"Security Commun Netw"},{"key":"3982_CR21","unstructured":"Kordy P, Schweitzer P (2012) The ADTool Manual. University of Luxembourg"},{"key":"3982_CR22","doi-asserted-by":"crossref","unstructured":"Kordy B, Kordy P, Mauw S, Schweitzer P (2013) ADTool: security analysis with attack\u2013defense trees. In: International conference on quantitative evaluation of systems, Springer, pp 173\u2013176","DOI":"10.1007\/978-3-642-40196-1_15"},{"key":"3982_CR23","doi-asserted-by":"crossref","unstructured":"Gadyatskaya O, Jhawar R, Kordy P, Lounis K, Mauw S, Trujillo-Rasua R (2016) Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. In: International Conference on Quantitative Evaluation of Systems, Springer, pp 159\u2013162","DOI":"10.1007\/978-3-319-43425-4_10"},{"key":"3982_CR24","unstructured":"Kubernetes$$\\_$$Official$$\\_$$Documentation (2021) What is Kubernetes? https:\/\/kubernetes.io\/docs\/concepts\/overview\/what-is-kubernetes\/"},{"key":"3982_CR25","unstructured":"Grider S (2019) Docker and kubernetes: the complete guide https:\/\/www.udemy.com\/course\/docker-and-kubernetes-the-complete-guide\/learn\/lecture\/11437326#overview"},{"key":"3982_CR26","unstructured":"Hightower K, Burns B, Beda J (2017) Kubernetes: up and running: dive into the future of infrastructure. \u201c O\u2019Reilly Media, Inc.\u201d"},{"issue":"5","key":"3982_CR27","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3390\/app9050931","volume":"9","author":"E Truyen","year":"2019","unstructured":"Truyen E, Van Landuyt D, Preuveneers D, Lagaisse B, Joosen W (2019) A comprehensive feature comparison study of open-source container orchestration frameworks. Appl Sci 9(5):931","journal-title":"Appl Sci"},{"key":"3982_CR28","doi-asserted-by":"crossref","unstructured":"Al\u00a0Jawarneh IM, Bellavista P, Bosi F, Foschini L, Martuscelli G, Montanari R, Palopoli A (2019) Container orchestration engines: a thorough functional and performance comparison. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2019.8762053"},{"key":"3982_CR29","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-1-4842-2415-1_4","volume-title":"Deploying rails with docker","author":"P Acu\u00f1a","year":"2016","unstructured":"Acu\u00f1a P (2016) Amazon EC2 container service. Deploying rails with docker. Springer, Kubernetes and ECS, pp 69\u201398"},{"key":"3982_CR30","doi-asserted-by":"crossref","unstructured":"Ifrah S (2019) Deploying containerized applications with amazon ECS. In: Deploy Containers on AWS, Springer, pp 83\u2013133","DOI":"10.1007\/978-1-4842-5101-0_3"},{"key":"3982_CR31","unstructured":"Pousty S, Miller K (2014) Getting Started with OpenShift: a Guide for Impatient Beginners. \u201c O\u2019Reilly Media, Inc.\u201d"},{"key":"3982_CR32","doi-asserted-by":"crossref","unstructured":"Lossent A, Peon AR, Wagner A (2017) PaaS for web applications with OpenShift Origin. In: J Phys: Conf Series, IOP Publishing, vol 898, p 082037","DOI":"10.1088\/1742-6596\/898\/8\/082037"},{"key":"3982_CR33","doi-asserted-by":"crossref","unstructured":"Aly M, Khomh F, Yacout S (2018) Kubernetes or openShift? Which technology best suits eclipse hono IoT deployments. In: 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA), IEEE, pp 113\u2013120","DOI":"10.1109\/SOCA.2018.00024"},{"key":"3982_CR34","unstructured":"MANGAT M (2021) Best container orchestration tools for 2020 https:\/\/phoenixnap.com\/blog\/container-orchestration-tools"},{"key":"3982_CR35","doi-asserted-by":"crossref","unstructured":"Pan Y, Chen I, Brasileiro F, Jayaputera G, Sinnott R (2019) A performance comparison of cloud-based container orchestration tools. In: 2019 IEEE International Conference on Big Knowledge (ICBK), IEEE, pp 191\u2013198","DOI":"10.1109\/ICBK.2019.00033"},{"key":"3982_CR36","unstructured":"Naser H (2017) Kubernetes Vs. mesos: a comparison of containerization platforms part II https:\/\/vexxhost.com\/blog\/kubernetes-mesos-comparison-containerization\/"},{"key":"3982_CR37","doi-asserted-by":"crossref","unstructured":"Modak A, Chaudhary S, Paygude P, Ldate S (2018) Techniques to secure data on cloud: docker swarm or kubernetes? In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), IEEE, pp 7\u201312","DOI":"10.1109\/ICICCT.2018.8473104"},{"key":"3982_CR38","unstructured":"Nomad (2020) Nomad vs. Kubernetes https:\/\/www.nomadproject.io\/intro\/vs\/kubernetes\/"},{"key":"3982_CR39","unstructured":"Linzel B, Zhu E, Flores G, Liu J, Dikaleh S (2019) How can OpenShift accelerate your Kubernetes adoption: a workshop exploring openShift features. In: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, pp 380\u2013381"},{"issue":"3","key":"3982_CR40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MS.2015.62","volume":"32","author":"C Anderson","year":"2015","unstructured":"Anderson C (2015) Docker [software engineering]. IEEE Software 32(3):102-c3","journal-title":"IEEE Software"},{"issue":"1","key":"3982_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-017-0124-3","volume":"8","author":"JP Martin","year":"2018","unstructured":"Martin JP, Kandasamy A, Chandrasekaran K (2018) Exploring the support for high performance applications in the container runtime environment. Human-centric Comput Inf Sci 8(1):1\u201315","journal-title":"Human-centric Comput Inf Sci"},{"key":"3982_CR42","doi-asserted-by":"crossref","unstructured":"Xie XL, Wang P, Wang Q (2017) The performance analysis of Docker and rkt based on Kubernetes. 2017 13th International Conference on Natural Computation. Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), IEEE, pp 2137\u20132141","DOI":"10.1109\/FSKD.2017.8393101"},{"key":"3982_CR43","unstructured":"Arundel J, Domingus J (2019) Cloud native devops with kubernetes: building, deploying, and scaling modern applications in the cloud. O\u2019Reilly Media"},{"key":"3982_CR44","unstructured":"Saito H, Lee HCC, Wu CY (2019) DevOps with Kubernetes: accelerating software delivery with container orchestrators. Packt Publishing Ltd"},{"key":"3982_CR45","unstructured":"Kubernetes$$\\_$$Official$$\\_$$Documentation (2021) Kubernetes Components https:\/\/kubernetes.io\/docs\/concepts\/overview\/components\/"},{"key":"3982_CR46","unstructured":"Mannambeth M (2020) Certified kubernetes administrator (CKA) with practice tests. https:\/\/www.udemy.com\/course\/certified-kubernetes-administrator-with-practice-tests\/learn\/lecture\/14296142"},{"key":"3982_CR47","first-page":"99","volume-title":"Advances in computer","author":"R Kumar","year":"2021","unstructured":"Kumar R, Trivedi MC (2021) Networking analysis and performance comparison of kubernetes CNI Plugins. Advances in computer. Springer, Berline, pp 99\u2013109"},{"issue":"1","key":"3982_CR48","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/2723872.2723882","volume":"49","author":"C Boettiger","year":"2015","unstructured":"Boettiger C (2015) An introduction to Docker for reproducible research. ACM SIGOPS Oper Syst Rev 49(1):71\u201379","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"3982_CR49","unstructured":"Belmont JM (2018) Hands-On continuous integration and delivery: build and release quality software at scale with Jenkins, Travis CI, and CircleCI. Packt Publishing Ltd"},{"key":"3982_CR50","doi-asserted-by":"crossref","unstructured":"Sewak M, Singh S (2018) Winning in the era of serverless computing and function as a service. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp 1\u20135","DOI":"10.1109\/I2CT.2018.8529465"},{"issue":"2","key":"3982_CR51","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCC.2017.32","volume":"4","author":"A Eivy","year":"2017","unstructured":"Eivy A (2017) Be wary of the economics of\u201c Serverless\u2019\u2019 cloud computing. IEEE Cloud Comput 4(2):6\u201312","journal-title":"IEEE Cloud Comput"},{"issue":"5","key":"3982_CR52","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIC.2018.053681358","volume":"22","author":"E Van Eyk","year":"2018","unstructured":"Van Eyk E, Toader L, Talluri S, Versluis L, U\u0163\u0103 A, Iosup A (2018) Serverless is more: from PaaS to present cloud computing. IEEE Internet Comput 22(5):8\u201317","journal-title":"IEEE Internet Comput"},{"key":"3982_CR53","doi-asserted-by":"crossref","unstructured":"Yan M, Castro P, Cheng P, Ishakian V (2016) Building a chatbot with serverless computing. In: Proceedings of the 1st International Workshop on Mashups of Things and APIs, pp 1\u20134","DOI":"10.1145\/3007203.3007217"},{"key":"3982_CR54","unstructured":"Spillner J (2017) Snafu: Function-as-a-service (faas) runtime design and implementation. arXiv preprint arXiv:170307562"},{"key":"3982_CR55","doi-asserted-by":"crossref","unstructured":"Kuntsevich A, Nasirifard P, Jacobsen HA (2018) A distributed analysis and benchmarking framework for apache openwhisk serverless platform. In: Proceedings of the 19th International Middleware Conference (Posters), pp 3\u20134","DOI":"10.1145\/3284014.3284016"},{"key":"3982_CR56","doi-asserted-by":"crossref","unstructured":"Djemame K, Parker M, Datsev D (2020) Open-source serverless architectures: an Evaluation of Apache OpenWhisk. In: 2020 IEEE\/ACM 13th International Conference on Utility and Cloud Computing (UCC), IEEE, pp 329\u2013335","DOI":"10.1109\/UCC48980.2020.00052"},{"key":"3982_CR57","unstructured":"Ellis A (2019) The power of interfaces in OpenFaaS https:\/\/blog.alexellis.io\/the-power-of-interfaces-openfaas\/"},{"key":"3982_CR58","unstructured":"Kaewkasi C (2018) Docker for serverless applications: containerize and orchestrate functions using OpenFaas, OpenWhisk, and Fn. Packt Publishing Ltd"},{"key":"3982_CR59","unstructured":"Prometheus$$\\_$$Official$$\\_$$Documentation (2021) What is Prometheus? https:\/\/prometheus.io\/docs\/introduction\/overview\/"},{"key":"3982_CR60","doi-asserted-by":"crossref","unstructured":"Sabharwal N, Pandey P (2020) Getting started with prometheus and alert manager. In: Monitoring Microservices and Containerized Applications, Springer, pp 43\u201383","DOI":"10.1007\/978-1-4842-6216-0_3"},{"key":"3982_CR61","unstructured":"Turnbull J (2018) Monitoring with Prometheus. Turnbull Press"},{"key":"3982_CR62","unstructured":"Brazil B (2018) Prometheus: up & running: infrastructure and application performance monitoring. \u201c O\u2019Reilly Media, Inc.\u201d"},{"key":"3982_CR63","doi-asserted-by":"crossref","unstructured":"Brattstrom M, Morreale P (2017) Scalable agentless cloud network monitoring. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, pp 171\u2013176","DOI":"10.1109\/CSCloud.2017.11"},{"issue":"7","key":"3982_CR64","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.001.1900660","volume":"58","author":"N Nguyen","year":"2020","unstructured":"Nguyen N, Kim T (2020) Toward highly scalable load balancing in kubernetes clusters. IEEE Commun Mag 58(7):78\u201383","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"3982_CR65","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1530873.1530884","volume":"36","author":"KS Trivedi","year":"2009","unstructured":"Trivedi KS, Sahner R (2009) SHARPE at the age of twenty two. ACM SIGMETRICS Perform Eval Rev 36(4):52\u201357","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"3982_CR66","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1860-3","volume-title":"Quantitative security risk assessment of enterprise networks","author":"X Ou","year":"2011","unstructured":"Ou X, Singhal A (2011) Quantitative security risk assessment of enterprise networks. Springer, Berlin"},{"key":"3982_CR67","unstructured":"Henley EJ, Kumamoto H (1996) Probabilistic risk assessment and management for engineers and scientists. IEEE Press (2nd Edition)"},{"key":"3982_CR68","volume-title":"Computer security: principles and practice","author":"W Stallings","year":"2012","unstructured":"Stallings W, Brown L, Bauer MD, Bhattacharjee AK (2012) Computer security: principles and practice. Pearson Education Upper Saddle River, NJ, USA"},{"key":"3982_CR69","doi-asserted-by":"crossref","unstructured":"Hubbard DW, Seiersen R (2016) How to measure anything in cybersecurity risk. Wiley Online Library","DOI":"10.1002\/9781119162315"},{"key":"3982_CR70","unstructured":"Ingoldsby TR (2010) Attack tree-based threat risk analysis. Amenaza Technologies Limited pp 3\u20139"},{"key":"3982_CR71","unstructured":"Coles-Kemp L, Bull\u00e9e JW, Montoya L, Junger M, Heath C, Pieters W, Wolos L (2015) Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security"},{"key":"3982_CR72","doi-asserted-by":"crossref","unstructured":"Alpernas K, Flanagan C, Fouladi S, Ryzhyk L, Sagiv M, Schmitz T, Winstein K (2018) Secure serverless computing using dynamic information flow control. arXiv preprint arXiv:180208984","DOI":"10.1145\/3276488"},{"issue":"1","key":"3982_CR73","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TNSM.2013.122313.130423","volume":"11","author":"J Bacon","year":"2014","unstructured":"Bacon J, Eyers D, Pasquier TFM, Singh J, Papagiannis I, Pietzuch P (2014) Information flow control for secure cloud computing. IEEE Transac Netw Service Manag 11(1):76\u201389","journal-title":"IEEE Transac Netw Service Manag"},{"key":"3982_CR74","doi-asserted-by":"publisher","unstructured":"Alpernas K, Flanagan C, Fouladi S, Ryzhyk L, Sagiv M, Schmitz T, Winstein K (2018) Secure serverless computing using dynamic information flow control. Proc ACM Program Lang 2(OOPSLA), https:\/\/doi.org\/10.1145\/3276488","DOI":"10.1145\/3276488"},{"key":"3982_CR75","doi-asserted-by":"crossref","unstructured":"O\u2019Meara W, Lennon RG (2020) Serverless computing security: protecting application logic. In: 2020 31st Irish Signals and Systems Conference (ISSC), IEEE, pp 1\u20135","DOI":"10.1109\/ISSC49989.2020.9180214"},{"key":"3982_CR76","unstructured":"Podjarny G (2019) Serverless Security. O\u2019Reilly Media Inc"},{"key":"3982_CR77","unstructured":"Li X, Leng X, Chen Y (2021) Securing serverless computing: challenges, solutions, and opportunities. arXiv preprint arXiv:210512581"},{"key":"3982_CR78","first-page":"939","volume":"2020","author":"P Datta","year":"2020","unstructured":"Datta P, Kumar P, Morris T, Grace M, Rahmati A, Bates A (2020) Valve: securing function workflows on serverless computing platforms. Proc The Web Conf 2020:939\u2013950","journal-title":"Proc The Web Conf"},{"key":"3982_CR79","first-page":"102843","volume":"60","author":"D Kelly","year":"2021","unstructured":"Kelly D, Glavin FG, Barrett E (2021) Denial of wallet-defining a looming threat to serverless computing. J Inform Security Appl 60:102843","journal-title":"J Inform Security Appl"},{"key":"3982_CR80","unstructured":"Jonas E, Schleier-Smith J, Sreekanti V, Tsai CC, Khandelwal A, Pu Q, Shankar V, Carreira J, Krauth K, Yadwadkar N, et\u00a0al. (2019) Cloud programming simplified: a berkeley view on serverless computing. arXiv preprint arXiv:190203383"},{"key":"3982_CR81","unstructured":"Ruddle A, Ward D, Weyl B, Idrees S, Roudier Y, Friedewald M, Leimbach T, Fuchs A, G\u00fcrgens S, Henniger O, et\u00a0al. (2009) Deliverable D2. 3: Security requirements for automotive on-board networks based on dark-side scenarios. EVITA project"},{"key":"3982_CR82","doi-asserted-by":"crossref","unstructured":"Guo J, Rahimi M, Cleland-Huang J, Rasin A, Hayes JH, Vierhauser M (2016) Cold-start software analytics. In: Proceedings of the 13th International Conference on Mining Software Repositories, pp 142\u2013153","DOI":"10.1145\/2901739.2901740"},{"key":"3982_CR83","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.future.2019.04.008","volume":"99","author":"P \u0160tefani\u010d","year":"2019","unstructured":"\u0160tefani\u010d P, Cigale M, Jones AC, Knight L, Taylor I, Istrate C, Suciu G, Ulisses A, Stankovski V, Taherizadeh S et al (2019) SWITCH workbench: a novel approach for the development and deployment of time-critical microservice-based cloud-native applications. Future Gener Comput Syst 99:197\u2013212","journal-title":"Future Gener Comput Syst"},{"key":"3982_CR84","doi-asserted-by":"crossref","unstructured":"Ghosh BC, Addya SK, Somy NB, Nath SB, Chakraborty S, Ghosh SK (2020) Caching techniques to improve latency in serverless architectures. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE, pp 666\u2013669","DOI":"10.1109\/COMSNETS48256.2020.9027427"},{"key":"3982_CR85","doi-asserted-by":"crossref","unstructured":"Hall A, Ramachandran U (2019) An execution model for serverless functions at the edge. In: Proceedings of the International Conference on Internet of Things Design and Implementation, pp 225\u2013236","DOI":"10.1145\/3302505.3310084"},{"key":"3982_CR86","doi-asserted-by":"crossref","unstructured":"Nguyen HD, Zhang C, Xiao Z, Chien AA (2019) Real-time serverless: enabling application performance guarantees. In: Proceedings of the 5th International Workshop on Serverless Computing, pp 1\u20136","DOI":"10.1145\/3366623.3368133"},{"key":"3982_CR87","doi-asserted-by":"crossref","unstructured":"Du D, Yu T, Xia Y, Zang B, Yan G, Qin C, Wu Q, Chen H (2020) Catalyzer: sub-millisecond startup for serverless computing with initialization-less booting. In: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, pp 467\u2013481","DOI":"10.1145\/3373376.3378512"},{"key":"3982_CR88","doi-asserted-by":"crossref","unstructured":"Bermbach D, Karakaya AS, Buchholz S (2020) Using application knowledge to reduce cold starts in FaaS services. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp 134\u2013143","DOI":"10.1145\/3341105.3373909"},{"key":"3982_CR89","doi-asserted-by":"crossref","unstructured":"Mahajan K, Mahajan S, Misra V, Rubenstein D (2019) Exploiting content similarity to address cold start in container deployments. In: Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, pp 37\u201339","DOI":"10.1145\/3360468.3366781"},{"key":"3982_CR90","doi-asserted-by":"crossref","unstructured":"Bardsley D, Ryan L, Howard J (2018) Serverless performance and optimization strategies. In: 2018 IEEE International Conference on Smart Cloud (SmartCloud), IEEE, pp 19\u201326","DOI":"10.1109\/SmartCloud.2018.00012"},{"key":"3982_CR91","unstructured":"Mahmoudi N, Lin C, Khazaei H, Litoiu M (2019) Optimizing serverless computing: introducing an adaptive function placement algorithm. In: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, pp 203\u2013213"},{"key":"3982_CR92","doi-asserted-by":"crossref","unstructured":"Aske A, Zhao X (2018) Supporting multi-provider serverless computing on the edge. In: Proceedings of the 47th International Conference on Parallel Processing Companion, pp 1\u20136","DOI":"10.1145\/3229710.3229742"},{"key":"3982_CR93","doi-asserted-by":"crossref","unstructured":"Correia J, Ribeiro F, Filipe R, Arauio F, Cardoso J (2018) Response time characterization of microservice-based systems. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), IEEE, pp 1\u20135","DOI":"10.1109\/NCA.2018.8548062"},{"key":"3982_CR94","doi-asserted-by":"crossref","unstructured":"Tsai PH, Hong HJ, Cheng AC, Hsu CH (2017) Distributed analytics in fog computing platforms using tensorflow and kubernetes. In: 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE, pp 145\u2013150","DOI":"10.1109\/APNOMS.2017.8094194"},{"key":"3982_CR95","unstructured":"Zhou J, Velichkevich A, Prosvirov K, Garg A, Oshima Y, Dutta D (2019) Katib: A distributed general automl platform on kubernetes. In: 2019 $$\\{$$USENIX$$\\}$$ Conference on Operational Machine Learning (OpML 19), pp 55\u201357"},{"issue":"16","key":"3982_CR96","doi-asserted-by":"publisher","first-page":"3591","DOI":"10.3390\/s19163591","volume":"19","author":"P Trakadas","year":"2019","unstructured":"Trakadas P, Nomikos N, Michailidis ET, Zahariadis T, Facca FM, Breitgand D, Rizou S, Masip X, Gkonis P (2019) Hybrid clouds for data-intensive, 5G-enabled IoT applications: an overview, key issues and relevant architecture. Sensors 19(16):3591","journal-title":"Sensors"},{"key":"3982_CR97","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.future.2018.04.005","volume":"87","author":"S Alonso-Monsalve","year":"2018","unstructured":"Alonso-Monsalve S, Garc\u00eda-Carballeira F, Calder\u00f3n A (2018) A heterogeneous mobile cloud computing model for hybrid clouds. Future Gener Comput Syst 87:651\u2013666","journal-title":"Future Gener Comput Syst"},{"key":"3982_CR98","doi-asserted-by":"crossref","unstructured":"Barcelona-Pons D, Garc\u00eda-L\u00f3pez P, Ruiz \u00c1, G\u00f3mez-G\u00f3mez A, Par\u00eds G, S\u00e1nchez-Artigas M (2019) Faas orchestration of parallel workloads. In: Proceedings of the 5th International Workshop on Serverless Computing, pp 25\u201330","DOI":"10.1145\/3366623.3368137"},{"issue":"1","key":"3982_CR99","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10723-017-9425-z","volume":"16","author":"C Ramon-Cortes","year":"2018","unstructured":"Ramon-Cortes C, Serven A, Ejarque J, Lezzi D, Badia RM (2018) Transparent orchestration of task-based parallel applications in containers platforms. J Grid Comput 16(1):137\u2013160","journal-title":"J Grid Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03982-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03982-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03982-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:33:50Z","timestamp":1643024030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03982-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":99,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3982"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03982-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"30 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}