{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:43:41Z","timestamp":1775018621754,"version":"3.50.1"},"reference-count":36,"publisher":"Pleiades Publishing Ltd","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1134\/s0361768823080200","type":"journal-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T09:30:41Z","timestamp":1706088641000},"page":"796-821","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Tertiary Study on Microservices: Research Trends and Recommendations"],"prefix":"10.1134","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6930-5337","authenticated-orcid":false,"given":"Z.","family":"Stojanov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9291-7873","authenticated-orcid":false,"given":"I.","family":"Hristoski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2237-8026","authenticated-orcid":false,"given":"J.","family":"Stojanov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1078-7068","authenticated-orcid":false,"given":"A.","family":"Stojkov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2024,1,24]]},"reference":[{"key":"3788_CR1","doi-asserted-by":"publisher","unstructured":"Cerny, T., Donahoo, M.J., and Pechanec, J., Disambiguation and comparison of SOA, microservices and self-contained systems, Proc. Int. Conf. on Research in Adaptive and Convergent Systems, Krakow, 2017, pp.\u00a0228\u2013235. https:\/\/doi.org\/10.1145\/3129676.3129682.","DOI":"10.1145\/3129676.3129682"},{"key":"3788_CR2","volume-title":"Building Microservices: Designing Fine-Grained Systems","author":"S. Newman","year":"2021","unstructured":"Newman, S., Building Microservices: Designing Fine-Grained Systems, Sebastopol, CA: O\u2019Reilly Media, 2021."},{"key":"3788_CR3","doi-asserted-by":"publisher","unstructured":"Dragoni, N., Giallorenzo, S., Lafuente, A.L., Mazzara, M., Montesi, F., and Mustafin, R., Safina, L., Microservices: Yesterday, today, and tomorrow, in Present and Ulterior Software Engineering, Mazzara, M. and Meyer, B., Eds., Cham: Springer Int. Publ., 2017, pp.\u00a0195\u2013216. https:\/\/doi.org\/10.1007\/978-3-319-67425-4_12.","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"3788_CR4","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1134\/S0361768821080077","volume":"47","author":"A.B. Alaasam","year":"2021","unstructured":"Alaasam, A.B., Radchenko, G., and Tchernykh, A., Refactoring the monolith workflow into independent micro-workflows to support stream processing, Program. Comput. Software, 2021, vol. 47, pp. 591\u2013600. https:\/\/doi.org\/10.1134\/S0361768821080077","journal-title":"Program. Comput. Software"},{"key":"3788_CR5","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1080\/08874417.2018.1520056","volume":"60","author":"S. Ba\u0161karada","year":"2018","unstructured":"Ba\u0161karada, S., Nguyen, V., and Koronios, A., Architecting microservices: Practical opportunities and challenges, J. Comput. Inf. Syst., 2018, vol. 60, pp. 428\u2013436. https:\/\/doi.org\/10.1080\/08874417.2018.1520056","journal-title":"J. Comput. Inf. Syst."},{"key":"3788_CR6","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1134\/S0361768822080151","volume":"48","author":"V.M. Ni\u00f1o-Mart\u00ednez","year":"2022","unstructured":"Ni\u00f1o-Mart\u00ednez, V.M., Ochar\u00e1n-Hern\u00e1ndez, J.O., Lim\u00f3n, X., and P\u00e9rez-Arrilaga, J.C., A microservice deployment guide, Program. Comput. Software, 2022, vol. 48, pp. 632\u2013645. https:\/\/doi.org\/10.1134\/S0361768822080151","journal-title":"Program. Comput. Software"},{"key":"3788_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MS.2018.2141030","volume":"35","author":"X. Larrucea","year":"2018","unstructured":"Larrucea, X., Santamaria, I., Colomo-Palacios, R., and Ebert, C., Microservices, IEEE Software, 2018, vol.\u00a035, pp. 96\u2013100. https:\/\/doi.org\/10.1109\/MS.2018.2141030","journal-title":"IEEE Software"},{"key":"3788_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MS.2016.68","volume":"33","author":"C. Ebert","year":"2016","unstructured":"Ebert, C., Gallardo, G., Hernantes, J., and Serrano, N., DevOps, IEEE Software, 2016, vol. 33, pp. 4\u2013100.","journal-title":"IEEE Software"},{"key":"3788_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11283-1","volume-title":"Continuous Software Engineering","author":"J. Bosch","year":"2014","unstructured":"Bosch, J., Continuous Software Engineering, Cham: Springer Int. Publ., 2014."},{"key":"3788_CR10","unstructured":"Kitchenham, B., Procedures for performing systematic review, Technical Report, Keele: Keele Univ., Department of Computer Science, Software Engineering Group, 2004, no. TR\/SE-0401."},{"key":"3788_CR11","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., and Mattsson, M., Systematic mapping studies in software engineering, Proc. 12th Int. Conf. on Evaluation and Assessment in Software Engineering, Bari, 2008, pp. 68\u201377.","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"3788_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K. Petersen","year":"2015","unstructured":"Petersen, K., Vakkalanka, S., and Kuzniarz, L., Guidelines for conducting systematic mapping studies in software engineering: an update, Inf. Software Technol., 2015, vol. 64, pp. 1\u20138. https:\/\/doi.org\/10.1016\/j.infsof.2015.03.007","journal-title":"Inf. Software Technol."},{"key":"3788_CR13","volume-title":"Evidence-Based Software Engineering and Systematic Reviews","author":"B. Kitchenham","year":"2016","unstructured":"Kitchenham, B., Budgen, D., and Brereton, P., Evidence-Based Software Engineering and Systematic Reviews, Boca Raton, FL: CRC Press, 2016."},{"key":"3788_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2018.09.006","volume":"106","author":"V. Garousi","year":"2019","unstructured":"Garousi, V., Felderer, M., and M\u00e4ntyl\u00e4, M.V., Guidelines for including grey literature and conducting multivocal literature reviews in software engineering, Inf. Software Technol., 2019, vol. 106, pp. 101\u2013121. https:\/\/doi.org\/10.1016\/j.infsof.2018.09.006","journal-title":"Inf. Software Technol."},{"key":"3788_CR15","volume-title":"Microservices in Action","author":"M. Bruce","year":"2019","unstructured":"Bruce, M. and Pereira, P.A., Microservices in Action, Shelter Island, NY: Manning Publ., 2019."},{"key":"3788_CR16","doi-asserted-by":"publisher","first-page":"110868","DOI":"10.1016\/j.jss.2020.110868","volume":"173","author":"M. Abdellatif","year":"2021","unstructured":"Abdellatif, M., Shatnawi, A., Mili, H., Moha, N., El Boussaidi, G., Hecht, G., Privat, J., and Gu\u00e9h\u00e9-neuc,\u00a0Y.-G., A taxonomy of service identification approaches for legacy software systems modernization, J. Syst. Software, 2021, vol. 173, p. 110868. https:\/\/doi.org\/10.1016\/j.jss.2020.110868","journal-title":"J. Syst. Software"},{"key":"3788_CR17","doi-asserted-by":"publisher","unstructured":"Henry, A. and Ridene, Y., Migrating to microservices, in Microservices: Science and Engineering, Bucchiarone, A., Dragoni, N., Dustdar, S., Lago, P., Mazzara, M., Rivera, V., and Sadovykh, A., Eds., Cham: Springer Int. Publ., 2020, pp. 45\u201372. https:\/\/doi.org\/10.1007\/978-3-030-31646-4_3","DOI":"10.1007\/978-3-030-31646-4_3"},{"key":"3788_CR18","doi-asserted-by":"publisher","first-page":"152","DOI":"10.5937\/jemc2102152S","volume":"11","author":"A. Stojanov","year":"2021","unstructured":"Stojanov, A. and Stojanov, Z., Review of methods for migrating software systems to microservices architecture, J. Eng. Manag. Competitiveness, 2021, vol. 11, pp.\u00a0152\u2013162.","journal-title":"J. Eng. Manag. Competitiveness"},{"key":"3788_CR19","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1134\/S0361768820080253","volume":"46","author":"J.A. Valdivia","year":"2020","unstructured":"Valdivia, J.A., Lora-Gonz\u00e1lez, J., Lim\u00f3n, X., Cortes-Verdin, K., and Ochar\u00e1n-Hern\u00e1ndez, J.O., Patterns related to microservice architecture: a multivocal literature review, Program. Comput. Software, 2020, vol. 46, pp. 594\u2013608. https:\/\/doi.org\/10.1134\/S0361768820080253","journal-title":"Program. Comput. Software"},{"key":"3788_CR20","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.3390\/app13031838","volume":"13","author":"A.S. Abdelfattah","year":"2023","unstructured":"Abdelfattah, A.S. and Cerny, T., Roadmap to reasoning in microservice systems: a rapid review, Appl. Sci., 2023, vol. 13, p. 1838. https:\/\/doi.org\/10.3390\/app13031838","journal-title":"Appl. Sci."},{"key":"3788_CR21","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1134\/S0361768820080083","volume":"46","author":"A.B. Alaasam","year":"2020","unstructured":"Alaasam, A.B., Radchenko, G., Tchernykh, A., and Gonz\u00e1lez Compe\u00e1n, J.L., Analytic study of containerizing stateful stream processing as microservice to support digital twins in fog computing, Program. Comput. Software, 2020, vol. 46, pp. 511\u2013525.","journal-title":"Program. Comput. Software"},{"key":"3788_CR22","doi-asserted-by":"publisher","first-page":"61585","DOI":"10.1109\/ACCESS.2022.3171803","volume":"10","author":"E.M. Arvanitou","year":"2022","unstructured":"Arvanitou, E.M., Ampatzoglou, A., Bibi, S., Chatzigeorgiou, A., and Deligiannis, I., Applying and researching DevOps: A tertiary study, IEEE Access, 2022, vol. 10, pp. 61585\u201361600. https:\/\/doi.org\/10.1109\/ACCESS.2022.3171803","journal-title":"IEEE Access"},{"key":"3788_CR23","doi-asserted-by":"publisher","first-page":"106202","DOI":"10.1016\/j.infsof.2019.106202","volume":"118","author":"H. Cadavid","year":"2020","unstructured":"Cadavid, H., Andrikopoulos, V., and Avgeriou, P., Architecting systems of systems: A tertiary study, Inf. Software Technol., 2020, vol. 118, p. 106202. https:\/\/doi.org\/10.1016\/j.infsof.2019.106202","journal-title":"Inf. Software Technol."},{"key":"3788_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1108\/JEIM-02-2019-0034","volume":"33","author":"V. Delavari","year":"2019","unstructured":"Delavari, V., Shaban, E., Janssen, M., and Hassanzadeh, A., Thematic mapping of cloud computing based on a systematic review: a tertiary study, J. Enterpr. Inf. Manag., 2019, vol. 33, pp. 161\u2013190. https:\/\/doi.org\/10.1108\/JEIM-02-2019-0034","journal-title":"J. Enterpr. Inf. Manag."},{"key":"3788_CR25","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.infsof.2017.01.007","volume":"85","author":"R. Hoda","year":"2017","unstructured":"Hoda, R., Salleh, N., Grundy, J., and Tee, H.M., Systematic literature reviews in agile software development: A tertiary study, Inf. Software Technol., 2017, vol.\u00a085, pp. 60\u201370. https:\/\/doi.org\/10.1016\/j.infsof.2017.01.007","journal-title":"Inf. Software Technol."},{"key":"3788_CR26","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.jss.2018.12.027","volume":"149","author":"M. Raatikainen","year":"2019","unstructured":"Raatikainen, M., Tiihonen, J., and M\u00e4nnist\u00f6, T., Software product lines and variability modeling: A tertiary study, J. Syst. Software, 2019, vol. 149, pp. 485\u2013510. https:\/\/doi.org\/10.1016\/j.jss.2018.12.027","journal-title":"J. Syst. Software"},{"key":"3788_CR27","doi-asserted-by":"publisher","first-page":"106620","DOI":"10.1016\/j.infsof.2021.106620","volume":"139","author":"H.K.V. Tran","year":"2021","unstructured":"Tran, H.K.V., Unterkalmsteiner, M., B\u00f6rstler, J., and bin Ali, N., Assessing test artifact quality\u2013a tertiary study, Inf. Software Technol., 2021, vol. 139, p. 106620. https:\/\/doi.org\/10.1016\/j.infsof.2021.106620","journal-title":"Inf. Software Technol."},{"key":"3788_CR28","doi-asserted-by":"publisher","unstructured":"Liu, X., Li, S., Zhang, H., Zhong, C., Wang, Y., Waseem, M., and Babar, M.A., Research on microservice architecture: A tertiary study, SSRN Electron. J., 2022 https:\/\/doi.org\/10.2139\/ssrn.4204345","DOI":"10.2139\/ssrn.4204345"},{"key":"3788_CR29","doi-asserted-by":"publisher","unstructured":"Costa, D.I.C., Filho, E.P. e S., da Silva, R.F., Quaresma Gama, T.D. de C., and Cort\u00e9s, M.I., Microservice architecture: a tertiary study, Proc. 14th Brazilian Symp. on Software Components, Architectures, and Reuse, Natal, 2020, pp. 61\u201370. https:\/\/doi.org\/10.1145\/3425269.3425277","DOI":"10.1145\/3425269.3425277"},{"key":"3788_CR30","doi-asserted-by":"publisher","unstructured":"Wohlin, C., Guidelines for snowballing in systematic literature studies and a replication in software engineering, Proc. 18th Int. Conf. on Evaluation and Assessment in Software Engineering, London, 2014, pp. 38:1\u201338:10. https:\/\/doi.org\/10.1145\/2601248.2601268","DOI":"10.1145\/2601248.2601268"},{"key":"3788_CR31","doi-asserted-by":"publisher","unstructured":"Zhou, X., Jin, Y., Zhang, H., Li, S., and Huang, X., A Mmap of threats to validity of systematic literature reviews in software engineering, Proc. 23rd Asia\u2013Pacific Software Engineering Conf. (APSEC), Hamilton, 2016, pp. 153\u2013160. https:\/\/doi.org\/10.1109\/APSEC.2016.031","DOI":"10.1109\/APSEC.2016.031"},{"key":"3788_CR32","doi-asserted-by":"publisher","DOI":"10.4135\/9781526485656","volume-title":"The SAGE Handbook of Current Developments in Grounded Theory","author":"A. Bryant","year":"2019","unstructured":"Bryant, A. and Charmaz, K., The SAGE Handbook of Current Developments in Grounded Theory, Thousand Oaks, CA: SAGE Publ., 2019."},{"key":"3788_CR33","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1177\/1098214005283748","volume":"27","author":"D.R. Thomas","year":"2006","unstructured":"Thomas, D.R., A general inductive approach for analyzing qualitative evaluation data, Am. J. Eval., 2006, vol. 27, pp. 237\u2013246. https:\/\/doi.org\/10.1177\/1098214005283748","journal-title":"Am. J. Eval."},{"key":"3788_CR34","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V. Braun","year":"2006","unstructured":"Braun, V. and Clarke, V., Using thematic analysis in psychology, Qual. Res. Psychol., 2006, vol. 3, pp. 77\u2013101. https:\/\/doi.org\/10.1191\/1478088706qp063oa","journal-title":"Qual. Res. Psychol."},{"key":"3788_CR35","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.5465\/amj.2018.0042","volume":"62","author":"K.T. Goh","year":"2019","unstructured":"Goh, K.T. and Pentland, B.T., From actions to paths to patterning: Toward a dynamic theory of patterning in routines, Acad. Manag. J., 2019, vol. 62, pp. 1901\u20131929.","journal-title":"Acad. Manag. J."},{"key":"3788_CR36","doi-asserted-by":"publisher","unstructured":"Sj\u00f8berg, D.I.K., Dyba, T., Anda, B.C.D., and Hannay, J.E., Building theories in software engineering, in Guide to Advanced Empirical Software Engineering, Shull, F., Singer, J., and Sj\u00f8berg, D.I.K., Eds., London: Springer, 2008, pp. 312\u2013336. https:\/\/doi.org\/10.1007\/978-1-84800-044-5_12.","DOI":"10.1007\/978-1-84800-044-5_12"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823080200.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768823080200","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768823080200.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:54:18Z","timestamp":1775012058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768823080200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["3788"],"URL":"https:\/\/doi.org\/10.1134\/s0361768823080200","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"14 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}