{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T14:04:38Z","timestamp":1770645878442,"version":"3.49.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union\u2019s Horizon 2020 research and innovation programme","award":["952647"],"award-info":[{"award-number":["952647"]}]},{"name":"Austrian Science Fund","award":["I 4268, I 4731-N"],"award-info":[{"award-number":["I 4268, I 4731-N"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,1,31]]},"abstract":"<jats:p>Microservice architectures are increasingly being used to develop application systems. Despite many guidelines and best practices being published, architecting microservice systems for security is challenging. Reasons are the size and complexity of microservice systems, their polyglot nature, and the demand for the continuous evolution of these systems. In this context, to manually validate that security architecture tactics are employed as intended throughout the system is a time-consuming and error-prone task. In this article, we present an approach to avoid such manual validation before each continuous evolution step in a microservice system, which we demonstrate using three widely used categories of security tactics: secure communication, identity management, and observability. Our approach is based on a review of existing security guidelines, the gray literature, and the scientific literature, from which we derived Architectural Design Decisions (ADDs) with the found security tactics as decision options. In our approach, we propose novel detectors to detect these decision options automatically and formally defined metrics to measure the conformance of a system to the different options of the ADDs. We apply the approach to a case study data set of 10 open source microservice systems, plus another 20 variants of these systems, for which we manually inspected the source code for security tactics. We demonstrate and assess the validity and appropriateness of our metrics by performing an assessment of their conformance to the ADDs in our systems\u2019 dataset through statistical methods.<\/jats:p>","DOI":"10.1145\/3532183","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T11:56:41Z","timestamp":1652270201000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Microservice Security Metrics for Secure Communication, Identity Management, and Observability"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6233-2591","authenticated-orcid":false,"given":"Uwe","family":"Zdun","sequence":"first","affiliation":[{"name":"University of Vienna, Faculty of Computer Science, Research Group Software Architecture, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4222-5075","authenticated-orcid":false,"given":"Pierre-Jean","family":"Queval","sequence":"additional","affiliation":[{"name":"University of Vienna, Faculty of Computer Science, Research Group Software Architecture, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0516-3274","authenticated-orcid":false,"given":"Georg","family":"Simhandl","sequence":"additional","affiliation":[{"name":"University of Vienna, Faculty of Computer Science, Research Group Software Architecture, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3591-7671","authenticated-orcid":false,"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology (TUHH), Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4194-9381","authenticated-orcid":false,"given":"Somik","family":"Chakravarty","sequence":"additional","affiliation":[{"name":"European Risk and Resilience Institute (EU-VRi), Stuttgart, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2195-4105","authenticated-orcid":false,"given":"Marjan","family":"Jelic","sequence":"additional","affiliation":[{"name":"European Risk and Resilience Institute (EU-VRi), Stuttgart, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2624-4586","authenticated-orcid":false,"given":"Aleksandar","family":"Jovanovic","sequence":"additional","affiliation":[{"name":"European Risk and Resilience Institute (EU-VRi), Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,2,13]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2010.11.018"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2018.00014"},{"key":"e_1_3_2_4_2","first-page":"1","volume-title":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","author":"Avritzer Alberto","year":"2020","unstructured":"Alberto Avritzer. 2020. Challenges and approaches for the assessment of micro-service architecture deployment alternatives in DevOps: A tutorial presented at ICSA 2020. In 2020 IEEE International Conference on Software Architecture Companion (ICSA-C). IEEE, Washington, DC, USA, 1\u20132."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxq042"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3129790.3129816"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/978-3-642-19125-1_12","volume-title":"Engineering Secure Software and Systems","author":"Bunke Michaela","year":"2011","unstructured":"Michaela Bunke and Karsten Sohr. 2011. An architecture-centric approach to detecting security patterns in software. In Engineering Secure Software and Systems, \u00dalfar Erlingsson, Roel Wieringa, and Nicola Zannone (Eds.). Springer Berlin, Berlin, 156\u2013166."},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/ICSA-C50368.2020.00024","volume-title":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","author":"Chondamrongkul Nacha","year":"2020","unstructured":"Nacha Chondamrongkul, Jing Sun, and Ian Warren. 2020. Automated security analysis for microservice architecture. In 2020 IEEE International Conference on Software Architecture Companion (ICSA-C). IEEE, Washington, DC, USA, 79\u201382."},{"key":"e_1_3_2_9_2","article-title":"Best Practices in Implementing a Secure Microservices Architecture","author":"Alliance Cloud Security","year":"2020","unstructured":"Cloud Security Alliance. 2020. Best Practices in Implementing a Secure Microservices Architecture. https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/.","journal-title":"https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810343"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.19"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92901-9_8"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/ISSREW51248.2020.00051","volume-title":"2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","author":"Flora Jos\u00e9","year":"2020","unstructured":"Jos\u00e9 Flora. 2020. Improving the security of microservice systems by detecting and tolerating intrusions. In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, Washington, DC, USA, 131\u2013134."},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19425-7"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693106"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.006"},{"key":"e_1_3_2_17_2","first-page":"385","volume-title":"Benefitting from the Grey Literature in Software Engineering Research","author":"Garousi Vahid","year":"2020","unstructured":"Vahid Garousi, Michael Felderer, Mika V. M\u00e4ntyl\u00e4, and Austen Rainer. 2020. Benefitting from the Grey Literature in Software Engineering Research. Springer International Publishing, Cham, 385\u2013413."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/bimj.200610301"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.48"},{"key":"e_1_3_2_20_2","first-page":"15","volume-title":"Software Architecture","author":"Guo George Yanbing","year":"1999","unstructured":"George Yanbing Guo, Joanne M. Atlee, and Rick Kazman. 1999. A software architecture reconstruction method. In Software Architecture. Springer, Berlin, 15\u201333."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2384592.2384607"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.10.004"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.11.049"},{"key":"e_1_3_2_24_2","volume-title":"Software Architect\u2019s Handbook: Become a Successful Software Architect by Implementing Effective Architecture Concepts","author":"Ingeno Joseph","year":"2018","unstructured":"Joseph Ingeno. 2018. Software Architect\u2019s Handbook: Become a Successful Software Architect by Implementing Effective Architecture Concepts. Packt Publishing Ltd., Birmingham."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA47634.2020.00012"},{"issue":"1","key":"e_1_3_2_27_2","first-page":"1","article-title":"The index of prediction accuracy: An intuitive measure useful for evaluating risk prediction models","volume":"2","author":"Kattan Michael W.","year":"2018","unstructured":"Michael W. Kattan and Thomas A. Gerds. 2018. The index of prediction accuracy: An intuitive measure useful for evaluating risk prediction models. Diagnostic and Prognostic Research 2, 1 (2018), 1\u20137.","journal-title":"Diagnostic and Prognostic Research"},{"key":"e_1_3_2_28_2","first-page":"26","article-title":"Reference architecture foundation for service oriented architecture version 1.0","volume":"2","author":"Laskey Ken","year":"2009","unstructured":"Ken Laskey, Jeff A. Estefan, Francis G. McCabe, and Danny Thornton. 2009. Reference architecture foundation for service oriented architecture version 1.0. Oasis, Committee Draft 2 (2009), 26.","journal-title":"Oasis, Committee Draft"},{"key":"e_1_3_2_29_2","first-page":"1","volume-title":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","author":"Levin Joshua","year":"2020","unstructured":"Joshua Levin and Theophilus A. Benson. 2020. ViperProbe: Rethinking microservice observability with eBPF. In 2020 IEEE 9th International Conference on Cloud Networking (CloudNet). IEEE, Washington, DC, USA, 1\u20138."},{"key":"e_1_3_2_30_2","article-title":"Microservices: A definition of this new architectural term","author":"Lewis James","year":"2004","unstructured":"James Lewis and Martin Fowler. 2004. Microservices: A definition of this new architectural term. http:\/\/martinfowler.com\/articles\/microservices.html.","journal-title":"http:\/\/martinfowler.com\/articles\/microservices.html"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568812"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/222124.222136","volume-title":"Proceedings of the 3rd ACM SIGSOFT Symposium on Foundations of Software Engineering (SIGSOFT\u201995)","author":"Murphy Gail C.","year":"1995","unstructured":"Gail C. Murphy, David Notkin, and Kevin Sullivan. 1995. Software reflexion models: Bridging the gap between source and high-level models. In Proceedings of the 3rd ACM SIGSOFT Symposium on Foundations of Software Engineering (SIGSOFT\u201995). ACM, New York, NY, USA, 18\u201328."},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","DOI":"10.4324\/9780203726631","volume-title":"Research Design and Statistical Analysis","author":"Myers Jerome L.","year":"2013","unstructured":"Jerome L. Myers, Arnold D. Well, and Robert F. Lorch Jr. 2013. Research Design and Statistical Analysis. Routledge, Abingdon, UK."},{"key":"e_1_3_2_34_2","volume-title":"Building Microservices: Designing Fine-Grained Systems","author":"Newman Sam","year":"2015","unstructured":"Sam Newman. 2015. Building Microservices: Designing Fine-Grained Systems. O\u2019Reilly, Sebastopol, CA."},{"key":"e_1_3_2_35_2","article-title":"NIST Special Publication (SP) 800-204, Security Strategies for Microservices-based Application Systems","year":"2019","unstructured":"NIST. 2019. NIST Special Publication (SP) 800-204, Security Strategies for Microservices-based Application Systems. https:\/\/www.nist.gov\/news-events\/news\/2019\/08\/security-strategies-microservices-based-application-systems-nist-publishes.","journal-title":"https:\/\/www.nist.gov\/news-events\/news\/2019\/08\/security-strategies-microservices-based-application-systems-nist-publishes"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_7"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-01002-z"},{"key":"e_1_3_2_38_2","article-title":"Microservices based Security Arch Doc Cheat Sheet","year":"2021","unstructured":"OWASP. 2021. Microservices based Security Arch Doc Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Microservices_based_Security_Arch_Doc_Cheat_Sheet.html.","journal-title":"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Microservices_based_Security_Arch_Doc_Cheat_Sheet.html"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.5220\/0005785501370146"},{"key":"e_1_3_2_40_2","volume-title":"Using Design Structure Matrices (DSM) as Security Controls for Software Architectures","author":"Parrend Pierre","year":"2017","unstructured":"Pierre Parrend, Timoth\u00e9 Mazzucotelli, and Florent Colin. 2017. Using Design Structure Matrices (DSM) as Security Controls for Software Architectures. Technical Report. Tech. Rep. 1, Complex System Digital Campus, cS-DC Research Report, ARK."},{"key":"e_1_3_2_41_2","first-page":"911","volume-title":"18th Int. Conf. on World Wide Web","author":"Pautasso Cesare","year":"2009","unstructured":"Cesare Pautasso and Erik Wilde. 2009. Why is the web loosely coupled? A multi-faceted metric for service design. In 18th Int. Conf. on World Wide Web. Association for Computing Machinery, New York, NY, USA, 911\u2013920."},{"key":"e_1_3_2_42_2","article-title":"A guide to security metrics","author":"Payne Shirley C.","year":"2006","unstructured":"Shirley C. Payne. 2006. A guide to security metrics. SANS Institute Information Security Reading Room. (2006).","journal-title":"SANS Institute Information Security Reading Room"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3393934.3278126"},{"key":"e_1_3_2_44_2","first-page":"23","volume-title":"International Conference on Model Driven Engineering Languages and Systems (MODELS)","author":"Peldszus Sven","year":"2019","unstructured":"Sven Peldszus, Katja Tuma, Daniel Str\u00fcber, Jan J\u00fcrjens, and Riccardo Scandariato. 2019. Secure data-flow compliance checks between models and code based on automated mappings. In International Conference on Model Driven Engineering Languages and Systems (MODELS). Springer, Berlin, 23\u201333."},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00014"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.11"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00011"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745505"},{"key":"e_1_3_2_49_2","article-title":"A pattern language for microservices","author":"Richardson Chris","year":"2017","unstructured":"Chris Richardson. 2017. A pattern language for microservices. http:\/\/microservices.io\/patterns\/index.html.","journal-title":"http:\/\/microservices.io\/patterns\/index.html"},{"key":"e_1_3_2_50_2","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"Schumacher Markus","year":"2013","unstructured":"Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, and Peter Sommerlad. 2013. Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, New York, NY."},{"key":"e_1_3_2_51_2","article-title":"Best Practices for Event-Driven Microservice Architecture","author":"Skowronski Jason","year":"2019","unstructured":"Jason Skowronski. 2019. Best Practices for Event-Driven Microservice Architecture. https:\/\/hackernoon.com\/best- practices-for-event-driven-microservice-architecture-e034p21lk.","journal-title":"https:\/\/hackernoon.com\/best- practices-for-event-driven-microservice-architecture-e034p21lk"},{"key":"e_1_3_2_52_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-11747-3_6","volume-title":"Engineering Secure Software and Systems","author":"Sohr Karsten","year":"2010","unstructured":"Karsten Sohr and Bernhard Berger. 2010. Idea: Towards architecture-centric security analysis of software. In Engineering Secure Software and Systems, Fabio Massacci, Dan Wallach, and Nicola Zannone (Eds.). Springer Berlin, Berlin, 70\u201378."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1097\/EDE.0b013e3181c30fb2"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2141031"},{"key":"e_1_3_2_55_2","first-page":"932","volume-title":"2018 IEEE Int\u2019l . Conf. on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom)","author":"Torkura Kennedy A.","year":"2018","unstructured":"Kennedy A. Torkura, Muhammad I. H. Sukmana, Anne V. D. M. Kayem, Feng Cheng, and Christoph Meinel. 2018. A cyber risk based moving target defense mechanism for microservice architectures. In 2018 IEEE Int\u2019l . Conf. on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom). IEEE, Washington, DC, USA, 932\u2013939."},{"key":"e_1_3_2_56_2","first-page":"122","volume-title":"4th Working IEEE\/IFIP Conf. on Software Architecture (WICSA\u201904)","author":"Deursen Arie Van","year":"2004","unstructured":"Arie Van Deursen, Christine Hofmeister, Rainer Koschke, Leon Moonen, and Claudio Riva. 2004. Symphony: View-driven software architecture reconstruction. In 4th Working IEEE\/IFIP Conf. on Software Architecture (WICSA\u201904). IEEE, Washington, DC, USA, 122\u2013132."},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693092"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.37"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"e_1_3_2_60_2","first-page":"4","article-title":"Owasp Cheat Sheets","volume":"315","author":"Woschek Martin","year":"2015","unstructured":"Martin Woschek. 2015. Owasp Cheat Sheets. pp 315 (2015), 4.","journal-title":"pp"},{"key":"e_1_3_2_61_2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/978-3-319-69035-3_29","volume-title":"Service-Oriented Computing","author":"Zdun Uwe","year":"2017","unstructured":"Uwe Zdun, Elena Navarro, and Frank Leymann. 2017. Ensuring and assessing architecture conformance to microservice decomposition patterns. In Service-Oriented Computing, Michael Maximilien, Antonio Vallecillo, Jianmin Wang, and Marc Oriol (Eds.). Springer International Publishing, Cham, 411\u2013429."},{"key":"e_1_3_2_62_2","first-page":"73","volume-title":"Service-Oriented Computing - 16th International Conference, ICSOC 2018, Hangzhou, China, November 12\u201315, 2018 (LNCS)","volume":"11236","author":"Zdun Uwe","year":"2018","unstructured":"Uwe Zdun, Mirko Stocker, Olaf Zimmermann, Cesare Pautasso, and Daniel L\u00fcbke. 2018. Guiding architectural decision making on quality aspects in microservice APIs. In Service-Oriented Computing - 16th International Conference, ICSOC 2018, Hangzhou, China, November 12\u201315, 2018 (LNCS), Vol. 11236. Springer, Berlin, 73\u201389."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-016-0337-0"},{"key":"e_1_3_2_64_2","first-page":"15","volume-title":"Int. Conf. on the Quality of Software Architectures","author":"Zimmermann Olaf","year":"2007","unstructured":"Olaf Zimmermann, Thomas Gschwind, Jochen K\u00fcster, Frank Leymann, and Nelly Schuster. 2007. Reusable architectural decision models for enterprise application development. In Int. Conf. on the Quality of Software Architectures. Springer, Berlin, 15\u201332."},{"key":"e_1_3_2_65_2","article-title":"Microservice API Patterns","author":"Zimmermann Olaf","year":"2021","unstructured":"Olaf Zimmermann, Mirko Stocker, Daniel L\u00fcbke, Cesare Pautasso, and Uwe Zdun. 2021. Microservice API Patterns. https:\/\/microservice-api-patterns.org\/.","journal-title":"https:\/\/microservice-api-patterns.org\/"},{"key":"e_1_3_2_66_2","article-title":"Microservice API Patterns","author":"Zimmermann Olaf","year":"2019","unstructured":"Olaf Zimmermann, Mirko Stocker, Uwe Zdun, Daniel Luebke, and Cesare Pautasso. 2019. Microservice API Patterns. https:\/\/microservice-api-patterns.org.","journal-title":"https:\/\/microservice-api-patterns.org"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532183","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:42Z","timestamp":1750183782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,31]]}},"alternative-id":["10.1145\/3532183"],"URL":"https:\/\/doi.org\/10.1145\/3532183","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,31]]},"assertion":[{"value":"2021-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}