{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:58:23Z","timestamp":1760029103840,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/netsoft51509.2021.9492620","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:30:02Z","timestamp":1627345802000},"page":"470-476","source":"Crossref","is-referenced-by-count":2,"title":["Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function"],"prefix":"10.1109","author":[{"given":"Shanay","family":"Behrad","sequence":"first","affiliation":[{"name":"b-com Institute of Research and Technology,Rennes,France"}]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Bretagne Occidentale (UBO),b-com,Brest,France"}]},{"given":"Philippe","family":"Bertin","sequence":"additional","affiliation":[{"name":"Orange b-com,Rennes,France"}]},{"given":"Cao-Thanh","family":"Phan","sequence":"additional","affiliation":[{"name":"b-com Institute of Research and Technology,Rennes,France"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1155\/2020\/1057902"},{"volume-title":"Building microservices: designing fine-grained systems","year":"2015","author":"Newman","key":"ref2"},{"volume-title":"Domain-driven design: tackling complexity in the heart of software","year":"2004","author":"Evans","key":"ref3"},{"issue":"3 & 4","key":"ref4","article-title":"A Survey on Microservice Security\u2013 Trends in Architecture, Privacy and Standardization on Cloud Computing Environments","volume":"11","author":"de Aguiar Monteiro","year":"2018","journal-title":"International Journal on Advances in Security"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SOCA.2016.15"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CLEI47609.2019.235060"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.cosrev.2021.100415"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICSA47634.2020.00023"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CLEI.2016.7833410"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1002\/spe.2869"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.14569\/IJACSA.2020.0110850"},{"key":"ref12","article-title":"Optimizing economics of microservices by planning for granularity level","volume-title":"Experience Report","author":"Mustafa","year":"2017"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.23919\/CISTI49556.2020.9141150"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICSA.2017.38"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICSA.2017.32"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SCC.2016.113"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-030-06019-0_10"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-319-44482-6_12"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.6028\/nist.sp.800-204"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-319-67262-5_4"},{"year":"2020","journal-title":"TS 23.501, Tech. Spec. V16.7.0","article-title":"Sytem architecture for the 5G system","key":"ref21"},{"year":"2020","journal-title":"TS 29.510, Tech. Spec. V17.0.0","article-title":"Network function repository service (stage 3)","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/c2018-0-01335-3"},{"year":"2019","journal-title":"Tech. Spec. F21618-01","article-title":"Network Repository Function (NRF) cloud native installation and upgrade guid","key":"ref24"}],"event":{"name":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2021,6,28]]},"location":"Tokyo, Japan","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 IEEE 7th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9492309\/9492525\/09492620.pdf?arnumber=9492620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:32:45Z","timestamp":1725013965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/netsoft51509.2021.9492620","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}