{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:42:05Z","timestamp":1775054525252,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3344948.3344996","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T12:16:25Z","timestamp":1567685785000},"page":"123-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Identifying availability tactics to support security architectural design of microservice-based systems"],"prefix":"10.1145","author":[{"given":"Gast\u00f3n","family":"M\u00e1rquez","sequence":"first","affiliation":[{"name":"Universidad T\u00e9cnica Federico Santa Mar\u00eda, Valpara\u00edso, Chile"}]},{"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[{"name":"Universidad T\u00e9cnica Federico Santa Mar\u00eda, Valpara\u00edso, Chile"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3101282.3101285"},{"key":"e_1_3_2_1_2_1","volume-title":"The Second International Workshop on From SofTware Requirements to Architectures (STRAW)","author":"Bachmann F.","year":"2003","unstructured":"F. Bachmann , L. Bass , and M. Klein . 2003. Moving from Quality Attribute Requirements to Architectural Decisions . The Second International Workshop on From SofTware Requirements to Architectures (STRAW) ( 2003 ), 122--129. F. Bachmann, L. Bass, and M. Klein. 2003. Moving from Quality Attribute Requirements to Architectural Decisions. The Second International Workshop on From SofTware Requirements to Architectures (STRAW) (2003), 122--129."},{"key":"e_1_3_2_1_4_1","volume-title":"Software Architecture in Practice","author":"Bass Len","unstructured":"Len Bass , Paul Clements , and Rick Kazman . 2013. Software Architecture in Practice ( 3 rd Edition). SEI Series in Software Engineering . Len Bass, Paul Clements, and Rick Kazman. 2013. Software Architecture in Practice (3rd Edition). SEI Series in Software Engineering.","edition":"3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"L. Bass M. Klein and F. Bachmann. 2000. Quality attribute design primitives. Technical Report. Software Engineering Institute Carnegie-Mellon University.  L. Bass M. Klein and F. Bachmann. 2000. Quality attribute design primitives . Technical Report. Software Engineering Institute Carnegie-Mellon University.","DOI":"10.21236\/ADA387868"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.274"},{"key":"e_1_3_2_1_7_1","volume-title":"Patterns of Enterprise Application Architecture","author":"Fowler Martin","unstructured":"Martin Fowler . 2002. Patterns of Enterprise Application Architecture . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . Martin Fowler. 2002. Patterns of Enterprise Application Architecture. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.067"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123779.3123804"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262799"},{"key":"e_1_3_2_1_12_1","unstructured":"Rick Kazman. {n. d.}. Rapid Software Composition by Assessing Untrusted Components. ({n. d.}). https:\/\/insights.sei.cmu.edu\/sei_blog\/2018\/11\/rapid-software-composition-by-assessing-untrusted-components.html Accessed: 2018-11-26.  Rick Kazman. {n. d.}. Rapid Software Composition by Assessing Untrusted Components. ({n. d.}). https:\/\/insights.sei.cmu.edu\/sei_blog\/2018\/11\/rapid-software-composition-by-assessing-untrusted-components.html Accessed: 2018-11-26."},{"key":"e_1_3_2_1_13_1","volume-title":"{n. d.}. Microservices. A definition of this new architectural term. https:\/\/martinfowler.com\/articles\/microservices.html. {Online","author":"Lewis J.","year":"2019","unstructured":"J. Lewis and M. Fowler . {n. d.}. Microservices. A definition of this new architectural term. https:\/\/martinfowler.com\/articles\/microservices.html. {Online ; accessed April 5th, 2019 }. J. Lewis and M. Fowler. {n. d.}. Microservices. A definition of this new architectural term. https:\/\/martinfowler.com\/articles\/microservices.html. {Online; accessed April 5th, 2019}."},{"key":"e_1_3_2_1_14_1","volume-title":"Actual Use of Architecture Patterns in Microservices-based Open Source Projects. 25th Asia-Pacific Software Engineering Conference (APSEC)","author":"M\u00e1rquez G.","year":"2018","unstructured":"G. M\u00e1rquez and H. Astudillo . 2018 . Actual Use of Architecture Patterns in Microservices-based Open Source Projects. 25th Asia-Pacific Software Engineering Conference (APSEC) ( 2018 ), 31--40. G. M\u00e1rquez and H. Astudillo. 2018. Actual Use of Architecture Patterns in Microservices-based Open Source Projects. 25th Asia-Pacific Software Engineering Conference (APSEC) (2018), 31--40."},{"key":"e_1_3_2_1_15_1","first-page":"71","article-title":"Review of Architectural Patterns and Tactics for Microservices in Academic and Industrial Literature. Avances en Ingenieria de Software a Nivel Iberoamericano","volume":"2018","author":"M\u00e1rquez G.","year":"2018","unstructured":"G. M\u00e1rquez , F. Osses , and H. Astudillo . 2018 . Review of Architectural Patterns and Tactics for Microservices in Academic and Industrial Literature. Avances en Ingenieria de Software a Nivel Iberoamericano , CIbSE 2018 (2018), 71 -- 84 . G. M\u00e1rquez, F. Osses, and H. Astudillo. 2018. Review of Architectural Patterns and Tactics for Microservices in Academic and Industrial Literature. Avances en Ingenieria de Software a Nivel Iberoamericano, CIbSE 2018 (2018), 71--84.","journal-title":"CIbSE"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2018.8789551"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241403.3241429"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479217"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.11.034"},{"key":"e_1_3_2_1_20_1","volume-title":"Building microservices: designing fine-grained systems","author":"Newman S.","year":"2015","unstructured":"S. Newman . 2015. Building microservices: designing fine-grained systems . O'Reilly Media, Inc. ( 2015 ). S. Newman. 2015. Building microservices: designing fine-grained systems. O'Reilly Media, Inc. (2015)."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Software Engineering and Knowledge Engineering","author":"Parvizi-Mosaed A.","year":"2014","unstructured":"A. Parvizi-Mosaed , S. Moaven , J. Habibi , and A. Heydarnoori . 2014. Towards a Tactic-Based Evaluation of Self-Adaptive Software Architecture Availability . International Conference on Software Engineering and Knowledge Engineering ( 2014 ), 168--173. A. Parvizi-Mosaed, S. Moaven, J. Habibi, and A. Heydarnoori. 2014. Towards a Tactic-Based Evaluation of Self-Adaptive Software Architecture Availability. International Conference on Software Engineering and Knowledge Engineering (2014), 168--173."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI47609.2019.235060"},{"key":"e_1_3_2_1_23_1","volume-title":"Microservices AntiPatterns and Pitfalls","author":"Richards M.","unstructured":"M. Richards . 2016. Microservices AntiPatterns and Pitfalls . O'Reilly Media . M. Richards. 2016. Microservices AntiPatterns and Pitfalls. O'Reilly Media."},{"key":"e_1_3_2_1_24_1","volume-title":"PHP and Thunderbird. International Conference on Software Architecture (ICSA)","author":"Santos J. C.","year":"2017","unstructured":"J. C. Santos , A. Peruma , M. Mirakhorli , M. Galstery , J. V. Vidal , and A. Sejfia . 2017. Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium , PHP and Thunderbird. International Conference on Software Architecture (ICSA) ( 2017 ), 69--78. J. C. Santos, A. Peruma, M. Mirakhorli, M. Galstery, J. V. Vidal, and A. Sejfia. 2017. Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird. International Conference on Software Architecture (ICSA) (2017), 69--78."},{"key":"e_1_3_2_1_25_1","volume-title":"An Empirical Investigation on the Motivations for the Adoption of Open Source Software. Tenth International Conference on Software Engineering Advances (ICSEA)","author":"Taibi Davide","year":"2015","unstructured":"Davide Taibi . 2015 . An Empirical Investigation on the Motivations for the Adoption of Open Source Software. Tenth International Conference on Software Engineering Advances (ICSEA) (2015). Davide Taibi. 2015. An Empirical Investigation on the Motivations for the Adoption of Open Source Software. Tenth International Conference on Software Engineering Advances (ICSEA) (2015)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2747470.2747474"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.01.051"},{"key":"e_1_3_2_1_28_1","unstructured":"M. E. Whitman and H. J. Mattord. 2011. Principles of information security. Cengage Learning.   M. E. Whitman and H. J. Mattord. 2011. Principles of information security . Cengage Learning."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"C. Wohlin P. Runeson M. H\u00f6st M. C. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in software engineering. Springer Science and Business Media (2012).   C. Wohlin P. Runeson M. H\u00f6st M. C. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in software engineering. Springer Science and Business Media (2012).","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290420.3290476"}],"event":{"name":"ECSA: European Conference on Software Architecture","location":"Paris France","acronym":"ECSA"},"container-title":["Proceedings of the 13th European Conference on Software Architecture - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344996","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344948.3344996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":29,"alternative-id":["10.1145\/3344948.3344996","10.1145\/3344948"],"URL":"https:\/\/doi.org\/10.1145\/3344948.3344996","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}