{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:35:17Z","timestamp":1764333317712,"version":"3.37.3"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Funds through Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT) Instituto de Engenharia de Sistemas e Computadores - Investiga\u00e7\u00e3o e Desenvolvimento","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}]},{"name":"Data Consistency in Microservices Compositions","award":["PTDC\/CCI-COM\/2156\/2021"],"award-info":[{"award-number":["PTDC\/CCI-COM\/2156\/2021"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3298113","type":"journal-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:51:52Z","timestamp":1690221112000},"page":"78457-78470","source":"Crossref","is-referenced-by-count":3,"title":["\u03bcVerum: Intrusion Recovery for Microservice Applications"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6834-705X","authenticated-orcid":false,"given":"David R.","family":"Matos","sequence":"first","affiliation":[{"name":"INESC-ID, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2872-7300","authenticated-orcid":false,"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[{"name":"INESC-ID, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9840-457X","authenticated-orcid":false,"given":"Ant\u00f3nio Rito","family":"Silva","sequence":"additional","affiliation":[{"name":"INESC-ID, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"263","reference":[{"journal-title":"Database Systems The Complete Book","year":"2009","author":"widom","key":"ref13"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522725"},{"key":"ref56","first-page":"1","article-title":"PHP Aspis: Using partial taint tracking to protect against injection attacks","author":"papagiannis","year":"2011","journal-title":"Proc 2nd USENIX Conf Web Appl Develop"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.49"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1004-8_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000047394.02444.8d"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2940009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/38714.38742"},{"journal-title":"Hacking Exposed Web Applications Web Application Security Secrets and Solutions","year":"2011","author":"sima","key":"ref52"},{"key":"ref11","first-page":"1","article-title":"Undo for operators: Building an undoable e-mail store","author":"brown","year":"2003","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_20"},{"key":"ref10","first-page":"89","article-title":"Intrusion recovery using selective re-execution","author":"kim","year":"2010","journal-title":"Proc 5th USENIX Conf Operating Syst Design Implementation"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5220\/0007918704830490"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135978"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.72"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095826"},{"key":"ref18","first-page":"81","article-title":"Data recovery for web applications","author":"akku?","year":"2010","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw (DSN)"},{"journal-title":"Trusted Computer Systems Evaluation Criteria","year":"1983","key":"ref51"},{"article-title":"OWASP top-102017","year":"2017","author":"wichers","key":"ref50"},{"journal-title":"Backtrack","year":"2014","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2141031"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5789"},{"journal-title":"Traceback&#x2014;Print or Retrieve a Stack Traceback","year":"2014","key":"ref47"},{"journal-title":"Adopting Microservices at Netflix Lessons for Architectural Design","year":"2018","author":"mauro","key":"ref42"},{"journal-title":"Reactive Kafka Microservice Template","year":"2018","author":"o\u2019meara","key":"ref41"},{"journal-title":"Eureka","year":"2018","key":"ref44"},{"journal-title":"Zuul","year":"2018","key":"ref43"},{"key":"ref49","first-page":"13","article-title":"A classification of SQL-injection attacks and countermeasures","author":"halfond","year":"2006","journal-title":"Proc IEEE Int Symp Secure Softw Eng"},{"journal-title":"Software Architecture in Practice","year":"2021","author":"bass","key":"ref8"},{"journal-title":"OWASP Top 10 2021","year":"2021","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778616"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2141039"},{"key":"ref3","first-page":"195","author":"dragoni","year":"2017","journal-title":"Microservices yesterday today and tomorrow"},{"journal-title":"RESTful Web Services","year":"2008","author":"richardson","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA47634.2020.00024"},{"journal-title":"Building Microservices With Go","year":"2017","author":"jackson","key":"ref40"},{"journal-title":"Sockshop microservice demo application","year":"2018","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100415"},{"journal-title":"Java RMI Remote Method Invocation","year":"1998","author":"downing-troy","key":"ref37"},{"journal-title":"Piggy Metrics A Simple Way to Deal With Personal Finances","year":"2018","key":"ref36"},{"article-title":"Requirements and model for IDES&#x2014;A real-time intrusion detection expert system","year":"1985","author":"denning","key":"ref31"},{"key":"ref30","first-page":"1","article-title":"Using generalization and characterization techniques in the anomaly-based detection of web attacks","author":"robertson","year":"2006","journal-title":"Proc 13th Symp Netw Distrib Syst Secur"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2018.00011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF02994844"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2141030"},{"journal-title":"Building Microservices Designing Fine-Grained Systems","year":"2015","author":"newman","key":"ref1"},{"journal-title":"Understanding SOA with Web Services","year":"2005","author":"newcomer","key":"ref39"},{"journal-title":"Microsoft NET Remoting","year":"2002","author":"mclean","key":"ref38"},{"key":"ref71","first-page":"217","article-title":"Design, implementation, and evaluation of repairable file service","author":"zhu","year":"2003","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319159"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3139472"},{"key":"ref24","first-page":"95","article-title":"A formal approach to recovery by compensating transactions","author":"korth","year":"1990","journal-title":"Proc 16th Int Conf Very Large Data Bases"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352603"},{"key":"ref26","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th Syst Admin Conf"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3178982"},{"journal-title":"Announcing ribbon Tying the netflix mid-tier services together","year":"2018","author":"wang","key":"ref25"},{"journal-title":"Apache JMeter A practical beginner&#x2019;s guide to automated testing and performance measurement for your websites","year":"2008","author":"halili","key":"ref64"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3448891.3448932"},{"key":"ref63","first-page":"1","article-title":"ZooKeeper: Wait-free coordination for internet-scale systems","author":"hunt","year":"2010","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033782"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945467"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274817"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575125"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958858"},{"article-title":"Spring boot reference guide part IV","year":"2013","author":"webb","key":"ref60"},{"journal-title":"MongoDB - The Definitive Guide Powerful and Scalable Data Storage","year":"2013","author":"chodorow","key":"ref62"},{"journal-title":"Little Shoot Proxy","year":"2018","key":"ref61"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10190596.pdf?arnumber=10190596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T18:11:28Z","timestamp":1692641488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10190596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3298113","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}