Security in Microservices Architectures
نویسندگان
چکیده
منابع مشابه
Migrating to Cloud-Native Architectures Using Microservices: An Experience Report
Migration to the cloud has been a popular topic in industry and academia in recent years. Despite many benefits that the cloud presents, such as high availability and scalability, most of the on-premise application architectures are not ready to fully exploit the benefits of this environment, and adapting them to this environment is a non-trivial task. Microservices have appeared recently as no...
متن کاملE-Business Security Architectures
By default the Internet is an open high risk environment and also the main place where the ebusiness is growing. As result of this fact, the paper aims to highlight the security aspects that relate to distributed applications [3], with reference to the concept of e-business. In this direction will analyze the quality characteristics, considered to be important by the author. Based on these and ...
متن کاملProfiling Microservices
We present a method for tracing the execution of RPC calls between microservices to understand the call tree and determine where bottlenecks arise. We show how the metadata propagated through our microservices system can later be reconciled and automatically rendered into a clear and digestible visual of the system. In our setup, we use Nameko a popular, open-source microservices framework writ...
متن کاملMicroservices Science and Engineering
In this paper we offer an overview on the topic of Microservices Science and Engineering (MSE) and we provide a collection of bibliographic references and links relevant to understand an emerging field. We try to clarify some misunderstandings related to microservices and Service-Oriented Architectures, and we also describe projects and applications our team have been working on in the recent p...
متن کاملDistributed component architectures security issues
Enterprise information systems and e-commerce applications are tightly integrated in today ’s modern enterprises. Component architectures are the base for building such multi-tier, distributed applications. This paper examines the security threats those systems must confront and the solutions proposed by the major existing component architectures. A comparative evaluation of both security featu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2021
ISSN: 1877-0509
DOI: 10.1016/j.procs.2021.01.320