{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:29:09Z","timestamp":1759332549086,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/icse-seip55303.2022.9793911","type":"proceedings-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T19:35:14Z","timestamp":1655494514000},"page":"135-144","source":"Crossref","is-referenced-by-count":2,"title":["Decision Models for Selecting Patterns and Strategies in Microservices Systems and their Evaluation by Practitioners"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Waseem","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University,Wuhan,China"}]},{"given":"Peng","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University,Wuhan,China"}]},{"given":"Aakash","family":"Ahmad","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, University of Ha&#x0027;il,Ha&#x0027;il,Saudi Arabia"}]},{"given":"Mojtaba","family":"Shahin","sequence":"additional","affiliation":[{"name":"Monash University,Faculty of Information Technology,Melbourne,Australia"}]},{"given":"Arif Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Oulu,M3S Empirical Software Engineering Research Unit,Oulu,Finland"}]},{"given":"Gaston","family":"Marquez","sequence":"additional","affiliation":[{"name":"Federico Santa Mar&#x00ED;a Technical University,Department of Electronics and Informatics,Concepci&#x00F3;n,Chile"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA51549.2021.00013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91431-8_62"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111061"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3463274.3463337"},{"journal-title":"Microservices Security Cheat Sheet","year":"2020","author":"jim","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00072"},{"journal-title":"Process Orchestration vs Choreography in Microservices","year":"2020","author":"katherine","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613832"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2016.38"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.008"},{"journal-title":"Security Patterns for Microservice Architectures","year":"2020","author":"matt","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29983-5_2"},{"journal-title":"Microservice Patterns and Best Practices Explore patterns like CQRS and event sourcing to create scalable maintainable and testable microservices","year":"2018","author":"pacheco","key":"ref18"},{"journal-title":"Architectural Patterns Uncover Essential Patterns in the Most Indispensable Realm of Enterprise Architecture","year":"2017","author":"raj","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC51365.2020.00020"},{"journal-title":"Decomposing Monoliths into Mi-croservices-AWS Prescriptive","year":"2021","author":"hari","key":"ref4"},{"journal-title":"Replication Package for the Paper Decision Models for Selecting Patterns and Strategies in Microservices Systems and their Evaluation by Practitioners","year":"2021","author":"waseem","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.31"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110798"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117775"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2018.00028"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3123779.3123804"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74313-4_8"},{"journal-title":"8 Ways to Secure Your Microservices Architecture","year":"2021","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3475792"},{"journal-title":"Microservices vs Service-Oriented Architecture","year":"2015","author":"richards","key":"ref20"},{"journal-title":"Service Discovery in Microservice Architecture","year":"2019","author":"sanchi","key":"ref22"},{"journal-title":"Microservices Patterns With examples in Java","year":"2018","author":"richardson","key":"ref21"},{"journal-title":"Microservices and Its Security Patterns","year":"2021","author":"singh","key":"ref24"},{"journal-title":"Microservices Design Patterns Implementation Patterns Part 2 (Anti-Corruption Layer)","year":"2019","author":"satish","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8781036"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"106600","DOI":"10.1016\/j.infsof.2021.106600","article-title":"From monolithic systems to microservices: An assessment framework","volume":"137","author":"taibi","year":"2021","journal-title":"Information and Software Technology"}],"event":{"name":"2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","start":{"date-parts":[[2022,5,22]]},"location":"Pittsburgh, PA, USA","end":{"date-parts":[[2022,5,24]]}},"container-title":["2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9793838\/9793543\/09793911.pdf?arnumber=9793911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:04:28Z","timestamp":1657569868000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9793911\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icse-seip55303.2022.9793911","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}