CLAIM: a Lightweight Approach to Identify Microservices in Dockerized Environments
Abstract
References
Index Terms
- CLAIM: a Lightweight Approach to Identify Microservices in Dockerized Environments
Recommendations
A Comparison of Static and Dynamic Analysis to Identify Microservices in Monolith Systems
Software ArchitectureAbstractOne of the most challenging problems in migrating a monolith to a microservice architecture is the identification of the microservices boundaries. Several approaches have recently been proposed for the automatic identification of microservices, ...
Microservices Security: Bad vs. Good Practices
Software Architecture. ECSA 2022 Tracks and WorkshopsAbstractThe microservice architectural style is widespread in enterprise IT, making the securing of microservices a crucial issue. Many bad practices in securing microservices have been identified by researchers and practitioners, along with security good ...
How do microservices evolve? An empirical analysis of changes in open-source microservice repositories
Abstract Context.Microservice architectures are an emergent service-oriented paradigm widely used in industry to develop and deploy scalable software systems. The underlying idea is to design highly independent services that ...
Highlights- We analyzed 11 open-source microservice repositories to study their evolution over time.
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 90Total Downloads
- Downloads (Last 12 months)90
- Downloads (Last 6 weeks)24
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in