Security in Microservices Architectures

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Migrating to Cloud-Native Architectures Using Microservices: An Experience Report

Migration to the cloud has been a popular topic in industry and academia in recent years. Despite many benefits that the cloud presents, such as high availability and scalability, most of the on-premise application architectures are not ready to fully exploit the benefits of this environment, and adapting them to this environment is a non-trivial task. Microservices have appeared recently as no...

متن کامل

E-Business Security Architectures

By default the Internet is an open high risk environment and also the main place where the ebusiness is growing. As result of this fact, the paper aims to highlight the security aspects that relate to distributed applications [3], with reference to the concept of e-business. In this direction will analyze the quality characteristics, considered to be important by the author. Based on these and ...

متن کامل

Profiling Microservices

We present a method for tracing the execution of RPC calls between microservices to understand the call tree and determine where bottlenecks arise. We show how the metadata propagated through our microservices system can later be reconciled and automatically rendered into a clear and digestible visual of the system. In our setup, we use Nameko a popular, open-source microservices framework writ...

متن کامل

Microservices Science and Engineering

In this paper we offer an overview on the topic of Microservices Science and Engineering (MSE) and we provide a collection of bibliographic references and links relevant to understand an emerging field. We try to clarify some misunderstandings related to microservices and Service-Oriented Architectures, and we also describe projects and applications our team have been working on in the recent p...

متن کامل

Distributed component architectures security issues

Enterprise information systems and e-commerce applications are tightly integrated in today ’s modern enterprises. Component architectures are the base for building such multi-tier, distributed applications. This paper examines the security threats those systems must confront and the solutions proposed by the major existing component architectures. A comparative evaluation of both security featu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2021

ISSN: 1877-0509

DOI: 10.1016/j.procs.2021.01.320