{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:39:29Z","timestamp":1759091969326},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,17]]},"DOI":"10.23919\/softcom50211.2020.9238277","type":"proceedings-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T20:07:18Z","timestamp":1603915638000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Recommendations for Enhancing Security in Microservice Environment Altered in an Intelligent Way"],"prefix":"10.23919","author":[{"given":"Tihomir","family":"Tenev","sequence":"first","affiliation":[]},{"given":"Simeon","family":"Tsvetanov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"46","article-title":"Organizing security patterns related to security and pattern recognition requirements","author":"bunke","year":"2012","journal-title":"International Journal on Advances in Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2384592.2384607"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415484"},{"year":"0","key":"ref14"},{"journal-title":"Security Patterns Repository Version 1 0","year":"2003","author":"kienzle","key":"ref15"},{"journal-title":"Security Design Patterns","year":"2004","author":"blakley","key":"ref16"},{"journal-title":"Docker Checkpoint","year":"0","key":"ref17"},{"journal-title":"Checkpoint\/Restore in User-space","year":"0","key":"ref18"},{"journal-title":"How to set ulimit values","year":"0","key":"ref19"},{"key":"ref28","article-title":"Patterns for Secure Cloud IaaS","author":"fernandez","year":"2016","journal-title":"Proceedings of the Asian Pattern Languages of Programs (PLoP) Conference"},{"journal-title":"Security Patterns - Integrating Security and Systems Engineering","year":"2006","author":"schumacher","key":"ref4"},{"key":"ref27","article-title":"Patterns for Secure Cloud IaaS","author":"fernandez","year":"2016","journal-title":"Proceedings of the Asian Pattern Languages of Programs (PLoP) Conference"},{"key":"ref3","first-page":"19","article-title":"Microflows: Enabling Agile Business Process Modeling to Orchestrate Semantically-Annotated Microservices","author":"oberhauser","year":"2017","journal-title":"Proceeding of the Seventh International Symposium on Business Modeling and Software Design (BMSD 2017)"},{"key":"ref6","article-title":"Microservices: From Design to Deployment","author":"richardson","year":"2016","journal-title":"Nginx"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2008.4670550"},{"journal-title":"Design Patterns - Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"ref5"},{"journal-title":"Thread Modeling Designing for Security","year":"2016","author":"shostack","key":"ref8"},{"year":"0","key":"ref7"},{"journal-title":"Microservices a definition of this new architectural term","year":"2014","author":"fowler","key":"ref2"},{"journal-title":"DMTF Releases CIM 2 52","year":"0","key":"ref9"},{"journal-title":"Building Microservices","year":"2015","author":"newman","key":"ref1"},{"journal-title":"OneNote","year":"0","key":"ref20"},{"journal-title":"Security Design Patterns Part 1","year":"2001","author":"romanowsky","key":"ref22"},{"journal-title":"Configuring Auto update","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1753196.1753225"},{"journal-title":"File permissions and attributes","year":"0","key":"ref23"},{"journal-title":"RSYNC","year":"0","key":"ref26"},{"journal-title":"Pluggable Authentication Modules (PAM)","year":"0","key":"ref25"}],"event":{"name":"2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2020,9,17]]},"location":"Split, Croatia","end":{"date-parts":[[2020,9,19]]}},"container-title":["2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9238132\/9238148\/09238277.pdf?arnumber=9238277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T23:46:31Z","timestamp":1640043991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9238277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,17]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/softcom50211.2020.9238277","relation":{},"subject":[],"published":{"date-parts":[[2020,9,17]]}}}