Microservices Security: Bad vs. Good Practices.
Francisco PonceJacopo SoldaniHernán AstudilloAntonio BrogiPublished in: ECSA (Tracks and Workshops) (2022)
Keyphrases
- anomaly detection
- intrusion detection
- network security
- information security
- security policies
- security requirements
- security vulnerabilities
- case study
- information assurance
- security problems
- security mechanisms
- functional requirements
- statistical databases
- computer networks
- security analysis
- smart card
- security threats
- security management
- security measures
- database
- security issues
- countermeasures
- encryption scheme
- security level
- cryptographic protocols
- security properties
- access control
- virtual private network