You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

1131 lines
58 KiB

% Encoding: UTF-8
@misc{felisberto2024tradeoffsmonolithicvsdistributed,
title = {The trade-offs between Monolithic vs. Distributed Architectures},
author = {Matheus Felisberto},
year = {2024},
eprint = {2405.03619},
archiveprefix = {arXiv},
primaryclass = {cs.SE},
url = {https://arxiv.org/abs/2405.03619}
}
@article{cloudArchHistory,
author = {Kratzke, Nane},
title = {A Brief History of Cloud Application Architectures},
journal = {Applied Sciences},
volume = {8},
year = {2018},
number = {8},
article-number = {1368},
url = {https://www.mdpi.com/2076-3417/8/8/1368},
issn = {2076-3417},
abstract = {This paper presents a review of cloud application architectures and its evolution. It reports observations being made during a research project that tackled the problem to transfer cloud applications between different cloud infrastructures. As a side effect, we learned a lot about commonalities and differences from plenty of different cloud applications which might be of value for cloud software engineers and architects. Throughout the research project, we analyzed industrial cloud standards, performed systematic mapping studies of cloud-native application-related research papers, did action research activities in cloud engineering projects, modeled a cloud application reference model, and performed software and domain-specific language engineering activities. Two primary (and sometimes overlooked) trends can be identified. First, cloud computing and its related application architecture evolution can be seen as a steady process to optimize resource utilization in cloud computing. Second, these resource utilization improvements resulted over time in an architectural evolution of how cloud applications are being built and deployed. A shift from monolithic service-oriented architectures (SOA), via independently deployable microservices towards so-called serverless architectures, is observable. In particular, serverless architectures are more decentralized and distributed, and make more intentional use of separately provided services. In other words, a decentralizing trend in cloud application architectures is observable that emphasizes decentralized architectures known from former peer-to-peer based approaches. This is astonishing because, with the rise of cloud computing (and its centralized service provisioning concept), the research interest in peer-to-peer based approaches (and its decentralizing philosophy) decreased. However, this seems to change. Cloud computing could head into the future of more decentralized and more meshed services.},
doi = {10.3390/app8081368}
}
@article{ieecloudcomputing,
author = {Saraswat Manish},
journal = {SMART –2020, IEEE Conference ID: 50582},
title = {Cloud Computing: Comparison and Analysis of Cloud Service Providers — AWS, Microsoft and Google},
year = {2021}
}
@article{javaTheUnixWay,
author = {Lewis, James},
journal = {33rd Degree Conference Krakow Poland Micro services},
title = {Java, the Unix Way},
date = {19.21 March 2012},
year = {2012}
}
@article{theComparisonofMicroserviceandMonolithicArchitecture,
author = {Gros, Konrad and Zabierowski, Wojciech},
journal = {MEMSTECH 2020},
title = {The Comparison of Microservice and Monolithic Architecture},
date = {22-26 April 2020},
year = {2020}
}
@article{monolithVsMicroserviceScaling,
author = {Blinowski, Grzegorz and Ojdowska, Anna and PRZYBYŁEK Adam},
title = {Monolithic vs. Microservice Architecture: A Performance and Scalability Evaluation},
date = {30 November 2021},
year = {2021}
}
@article{7931583,
author = {Dai, Wenbin and Vyatkin, Valeriy and Christensen, James H. and Dubinin, Victor N.},
journal = {IEEE Transactions on Industrial Informatics},
title = {Response to “Comments on Bridging Service-Oriented Architecture and IEC 61499 for Flexibility and Interoperability”},
year = {2017},
volume = {13},
number = {4},
pages = {1497-1502},
doi = {10.1109/TII.2017.2706066}
}
@inproceedings{6139091,
author = {Clark, Tony and Barn, Balbir S.},
booktitle = {Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System (SOSE)},
title = {Event driven architecture modelling and simulation},
year = {2011},
volume = {},
number = {},
pages = {43-54},
doi = {10.1109/SOSE.2011.6139091}
}
@book{45210920120101,
abstract = {Cloud computing is considered to be one of the main business drivers for growth and innovation, and a global survey by Gartner listed cloud computing as one of the top three technology priorities for CIOs in 2012. Yet debate continues around its real benefits, security and data protection issues. The articles in this ebook look at different aspects of cloud computing, from strategic and infrastructure considerations to legal and security issues, aiming to provide practical advice and a clearer picture of its benefits and drawbacks.},
author = {{BCS The Chartered Institute for IT}},
isbn = {9781780171302},
publisher = {BCS The Chartered Institute for IT},
title = {Cloud Computing: Moving IT Out of the Office.},
year = {2012}
}
@inbook{Dressel2011,
author = {Dressel, Kathrin
and Pfeiffer, Birgit},
editor = {Schweiger, Stefan
and Dressel, Kathrin
and Pfeiffer, Birgit},
title = {Total Cost of Ownership -- ein innovativer Ansatz zum Ausbau des Servicegesch{\"a}fts},
booktitle = {Serviceinnovationen in Industrieunternehmen erfolgreich umsetzen: Neue Gesch{\"a}ftspotenziale gezielt durch Dienstleistungen aussch{\"o}pfen},
year = {2011},
publisher = {Gabler Verlag},
address = {Wiesbaden},
pages = {25--42},
abstract = {Die Bedeutung des Servicesektors kann aufgrund technologischer und struktureller Ver{\"a}nderungen, die sowohl auf Anbieter- als auch auf Nachfragerseite die Entwicklung des Servicesektors vorantreiben, nicht mehr geleugnet werden. Seit den 1970er Jahren vollzieht sich in den modernen Industriestaaten ein Strukturwandel von einer Industrie- zu einer Dienstleistungsgesellschaft. Aufgrund dieser sogenannten Terti{\"a}risierung verzeichnet Deutschland einen Besch{\"a}ftigungsanstieg, so dass mittlerweile mehr als 70 Prozent der Erwerbst{\"a}tigkeit auf Dienstleistungsberufe entf{\"a}llt. Dieser fr{\"u}her eher unbedeutende Bereich hat sich bis heute zum Job-Motor entwickelt und schafft in wirtschaftlich entwickelten L{\"a}ndern sieben von zehn neuen Arbeitspl{\"a}tzen. Es hat „gemessen an den Zust{\"a}nden von 1995 {\ldots} eine Neuorientierung von Wirtschaft und Gesellschaft hinsichtlich der Dienstleistungswirtschaft stattgefunden``.},
isbn = {978-3-8349-6834-0},
doi = {10.1007/978-3-8349-6834-0_2},
url = {https://doi.org/10.1007/978-3-8349-6834-0_2}
}
@inproceedings{6299509,
author = {Bechhoefer, Eric and Morton, Brogan},
booktitle = {2012 IEEE Conference on Prognostics and Health Management},
title = {Condition monitoring architecture: To reduce total cost of ownership},
year = {2012},
volume = {},
number = {},
pages = {1-9},
doi = {10.1109/ICPHM.2012.6299509}
}
@inproceedings{6149074,
author = {Martens, Benedikt and Walterbusch, Marc and Teuteberg, Frank},
booktitle = {2012 45th Hawaii International Conference on System Sciences},
title = {Costing of Cloud Computing Services: A Total Cost of Ownership Approach},
year = {2012},
volume = {},
number = {},
pages = {1563-1572},
doi = {10.1109/HICSS.2012.186}
}
@article{tayal2019determining,
title = {Determining the Total Cost of Ownership of Serverless Technologies when compared to Traditional Cloud},
author = {Tayal, Akash and Lam, Eric and Choudhury, Diganto and Dickerson, Meghan and Moovera, Ganesh and Arora, Gary},
journal = {Deloitte Consulting LLP, New York, USA, White Paper},
year = {2019}
}
@incollection{incollection,
author = {Martens, Benedikt and Zarvic, Novica and Teuteberg, Frank and Thomas, Oliver},
title = {Designing a risk-based partner selection process for collaborative cloud computing environments},
year = 2011,
booktitle = {Enterprise modelling and information systems architectures (EMISA 2011)},
publisher = {Gesellschaft für Informatik e.V.},
address = {Bonn},
pissn = {1617-5468},
isbn = {978-3-88579-284-0},
pages = {237--242}
}
@article{TotalCostofOwnershipModelsAnExploratoryStudy,
author = {Ferrin, Bruce G. and Plank, Richard E.},
title = {Total Cost of Ownership Models: An Exploratory Study},
journal = {Journal of Supply Chain Management},
volume = {38},
number = {2},
pages = {18-29},
doi = {https://doi.org/10.1111/j.1745-493X.2002.tb00132.x},
url = {https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1745-493X.2002.tb00132.x},
eprint = {https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1745-493X.2002.tb00132.x},
abstract = {SUMMARY This research examines organizational purchasing models focusing on the use of total cost of ownership (TCO) to value purchase opportunities. The research presents evidence that leading-edge companies actually use such models. This exploratory study provides, for the first time, data on the nature, and use, of the cost drivers on which organizations base their TCO computations. The study suggests a generic model of total cost of ownership is not appropriate. However, the findings of this research suggest a TCO model based on a core set of cost drivers, along with an auxiliary set of cost drivers, is appropriate. The core cost drivers would be present in all, or most, TCO computations. Purchasing managers could use different, specific cost drivers from the auxiliary set to tailor the TCO computation for a particular purchase situation. The authors also suggest that a value-based, multi-firm, or supply chain, TCO computation model is needed. Such a TCO model should be similar to a single-firm TCO model.},
year = {2002}
}
@article{sowmya2014layers,
title = {Layers of cloud--IaaS, PaaS and SaaS: a survey},
author = {Sowmya, SK and Deepika, P and Naren, J},
journal = {International Journal of Computer Science and Information Technologies},
volume = {5},
number = {3},
pages = {4477--4480},
year = {2014},
publisher = {Citeseer}
}
@inproceedings{9702776,
author = {Pramono, Luthfan Hadi and Yana Javista, Yohanes Krisna},
booktitle = {2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)},
title = {Firebase Authentication Cloud Service for RESTful API Security on Employee Presence System},
year = {2021},
volume = {},
number = {},
pages = {1-6},
doi = {10.1109/ISRITI54043.2021.9702776}
}
@inproceedings{seethamraju2013determinants,
title = {Determinants of SaaS ERP Systems Adoption.},
author = {Seethamraju, Ravi},
booktitle = {PACIS},
pages = {244},
year = {2013}
}
@inproceedings{7577423,
author = {Jha, Madan Mohan and Vilardell, Rosa Maria Ferrer and Narayan, Jai},
booktitle = {2016 IEEE 11th International Conference on Global Software Engineering (ICGSE)},
title = {Scaling Agile Scrum Software Development: Providing Agility and Quality to Platform Development by Reducing Time to Market},
year = {2016},
volume = {},
number = {},
pages = {84-88},
doi = {10.1109/ICGSE.2016.24}
}
@article{dsgvoWDDB,
title = {DSGVO und Nutzung US-amerikanischer Cloud-Dienste},
author = {Wissenschaftliche Dienste Deutscher Bundestag},
year = {2021},
doi = {WD3-3000-102/21},
publisher = {Deutscher Bundestag}
}
@misc{akbarimoghanjoughi2023service,
title = {Service Level Agreements for Communication Networks: A Survey},
author = {Ayyoub Akbari-Moghanjoughi and José Roberto de Almeida Amazonas and Germán Santos-Boada and Josep Solé-Pareta},
year = {2023},
eprint = {2309.07272},
archiveprefix = {arXiv},
primaryclass = {cs.NI}
}
@article{8057255,
author = {Aslam, Adeel and Ahmad, Naveed and Saba, Tanzila and Almazyad, Abdulaziz S. and Rehman, Amjad and Anjum, Adeel and Khan, Abid},
journal = {IEEE Access},
title = {Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development},
year = {2017},
volume = {5},
number = {},
pages = {20349-20373},
doi = {10.1109/ACCESS.2017.2757605}
}
@article{riskMgm,
author = {Tzvi Raz and Aaron J. Shenhar and Dov Dvir},
title = {Risk management, project success, and technological uncertainty},
journal = {R\&D Management},
year = {2002},
pages = {101-109},
doi = {0.1111/1467-9310.00243}
}
@article{373966,
author = {Andrews, C.J.},
journal = {IEEE Transactions on Power Systems},
title = {Evaluating risk management strategies in resource planning},
year = {1995},
volume = {10},
number = {1},
pages = {420-426},
doi = {10.1109/59.373966}
}
@article{TATE1990207,
title = {Case study of risk management, incremental development, and evolutionary prototyping},
journal = {Information and Software Technology},
volume = {32},
number = {3},
pages = {207-214},
year = {1990},
issn = {0950-5849},
doi = {https://doi.org/10.1016/0950-5849(90)90179-U},
url = {https://www.sciencedirect.com/science/article/pii/095058499090179U},
author = {G Tate and J Verner},
keywords = {case study, development methodology, evolutionary prototyping, incremental development, risk management, user development},
abstract = {The planning, development, and implementation of an administrative information system for the New Zealand Correspondence School is described. This was a brand new computer system for users with little or no previous experience of computing. The constraints on the project were such that conventional waterfall development using a third-generation language was impracticable. There was, moreover, a number of significant project risks, including requirements uncertainty, a tight time-schedule, staffing constraints, and possible problems of data quality and user acceptance. The case study describes how risk management was used to determine development strategies, including the selection of an appropriate life-cycle model, development methodology, and fourth-generation language development environment. A feature of the project, which contributed significantly to its ultimate success, was the high level of user involvement in the development process, including project management, requirements analysis, documentation, education, liaison, and some implementation.}
}
@inproceedings{101007,
author = {Boehm, Barry},
editor = {Ghezzi, C.
and McDermid, J. A.},
title = {Software risk management},
booktitle = {ESEC '89},
year = {1989},
publisher = {Springer Berlin Heidelberg},
address = {Berlin, Heidelberg},
pages = {1--19},
abstract = {Although software risk management is not yet a fully articulated discipline, its contributions to date have helped many software projects avoid devastating pitfalls and reach successful conclusions. The techniques of risk assessment and risk control outlined here stimulate a ``no surprises'' approach to software management which improves project management visibility and control, and significantly reduces software rework. (Rework costs generally comprise 40--50{\%} of overall software development costs; typically, 80{\%} of the rework costs are caused by the highest-risk 20{\%} of the software problems encountered.) And finally, risk management provides a useful framework for determining which software V{\&}V activities to pursue, and at what level of effort.},
isbn = {978-3-540-46723-6}
}
@article{SHRIVASTAVA20171,
title = {A risk management framework for distributed agile projects},
journal = {Information and Software Technology},
volume = {85},
pages = {1-15},
year = {2017},
issn = {0950-5849},
doi = {https://doi.org/10.1016/j.infsof.2016.12.005},
url = {https://www.sciencedirect.com/science/article/pii/S0950584916304815},
author = {Suprika Vasudeva Shrivastava and Urvashi Rathod},
keywords = {Distributed Agile Development (DAD), Agile Software Development, Distributed Software Development (DSD), Risk factor classification, Risk management framework in distributed agile development}
}
@article{relationVsNoSQL,
author = {Mohamed A. Mohamed, Obay G. Altrafi and Mohammed O. Ismail},
title = {Relational vs. NoSQL Databases: A Survey},
journal = {nternational Journal of Computer and Information Technology},
issn = {2279 – 0764},
year = {2014}
}
@article{5742778,
author = {Sakr, Sherif and Liu, Anna and Batista, Daniel M. and Alomari, Mohammad},
journal = {IEEE Communications Surveys \& Tutorials},
title = {A Survey of Large Scale Data Management Approaches in Cloud Environments},
year = {2011},
volume = {13},
number = {3},
pages = {311-336},
doi = {10.1109/SURV.2011.032211.00087}
}
@inproceedings{6809438,
author = {Emeakaroha, Vincent C. and Healy, Philip and Fatema, Kaniz and Morrison, John P.},
booktitle = {2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing},
title = {Analysis of Data Interchange Formats for Interoperable and Efficient Data Communication in Clouds},
year = {2013},
volume = {},
number = {},
pages = {393-398},
doi = {10.1109/UCC.2013.79}
}
@article{ttm,
author = {Mohamed A. Youssef},
title = {Design for Manufacturability and Time-to-Market},
year = {1994}
}
@article{ttmCost,
author = {Randy Perry, Robert P. Mahowald, Eric Hatcher and Stephen D. Hendrick},
title = {Force.com Cloud Platform Drives Huge Time to Market and Cost Savings},
journal = {IDC},
year = {2009}
}
@article{nist,
author = {Mell, Peter and Grance, Thimothy},
title = {The NIST Definition of Cloud Computing},
year = {2011},
month = {2011-09-28},
publisher = {Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD},
doi = {https://doi.org/10.6028/NIST.SP.800-145},
language = {en}
}
@article{validationOfStrategicDecisionModel,
author = {
Derkinderen, Frans G. J. and Crum, Roy L.},
title = {The Development and Empirical Validation of Strategic Decision Models},
journal = {Int. Studies of Mgt. \& Org., Vol. XVIU, No. 2},
year = {1988},
doi = {10.1080/00208825.1988.11656479}
}
@inproceedings{5235004,
author = {Valipour, Mohammad Hadi and Amirzafari, Bavar and Maleki, Khashayar Niki and Daneshpour, Negin},
booktitle = {2009 2nd IEEE International Conference on Computer Science and Information Technology},
title = {A brief survey of software architecture concepts and service oriented architecture},
year = {2009},
volume = {},
number = {},
pages = {34-38},
keywords = {Software architecture;Service oriented architecture;Computer architecture;Algorithm design and analysis;Software systems;Stability;Programming;Control systems;Web services;History;Software Architecture;Service-Oriented Architecture;Web Services},
doi = {10.1109/ICCSIT.2009.5235004}
}
@inproceedings{8966423,
author = {Ponce, Francisco and Márquez, Gastón and Astudillo, Hernán},
booktitle = {2019 38th International Conference of the Chilean Computer Science Society (SCCC)},
title = {Migrating from monolithic architecture to microservices: A Rapid Review},
year = {2019},
volume = {},
number = {},
pages = {1-7},
keywords = {Proposals;Computer architecture;Systematics;Architecture;Software;Databases;Microservices;Microservice Architecture;Migration to Microservices;Monolithic to Microservices},
doi = {10.1109/SCCC49216.2019.8966423}
}
@article{101007,
author = {Mangwani, Poonam and Mangwani, Niti and Motwani, Sachin},
journal = {SN Computer Science},
title = {Evaluation of a Multitenant SaaS Using Monolithic and Microservice Architectures},
volume = {4},
year = {2023},
doi = {10.1007/s42979-022-01610-2}
}
@article{Mulahuwaish2022,
author = {Mulahuwaish, Aos
and Korbel, Shane
and Qolomany, Basheer},
title = {Improving datacenter utilization through containerized service-based architecture},
journal = {Journal of Cloud Computing},
year = {2022},
month = {Sep},
day = {15},
volume = {11},
number = {1},
pages = {44},
abstract = {The modern datacenter's computing capabilities have far outstripped the applications running within and have become a hidden cost of doing business due to how software is architected and deployed. Resources are over-allocated to monolithic applications that sit idle for large parts of the day. If applications were architected and deployed differently, shared services could be used for multiple applications as needed. When combined with powerful orchestration software, containerized microservices can both deploy and dynamically scale applications from very small to very large within moments---scaling the application not only across a single datacenter but across all datacenters where the application(s) are deployed.},
issn = {2192-113X},
doi = {10.1186/s13677-022-00319-0},
url = {https://doi.org/10.1186/s13677-022-00319-0}
}
@article{sym14091824,
author = {Milić, Miloš and Makajić-Nikolić, Dragana},
title = {Development of a Quality-Based Model for Software Architecture Optimization: A Case Study of Monolith and Microservice Architectures},
journal = {Symmetry},
volume = {14},
year = {2022},
number = {9},
article-number = {1824},
url = {https://www.mdpi.com/2073-8994/14/9/1824},
issn = {2073-8994},
abstract = {Various architectures can be applied in software design. The aim of this research is to examine a typical implementation of Jakarta EE monolithic and microservice software architectures in the context of software quality attributes. Software quality standards are used to define quality models, as well as quality characteristics and sub-characteristics, i.e., software quality attributes. This paper evaluates monolithic and microservice architectures in the context of Coupling, Testability, Security, Complexity, Deployability, and Availability quality attributes. The performed examinations yielded a quality-based mixed integer goal programming mathematical model for software architecture optimization. The model incorporates various software metrics and considers their maximal, minimal or targeted values, as well as upper and lower deviations. The objective is the sum of all deviations, which should be minimal. Considering the presented model, a solution which incorporated multiple monoliths and microservices was defined. This way, the internal structure of the software is defined in a consistent and symmetrical context, while the external software behavior remains unchanged. In addition, an intersection point of monolithic and microservice software architectures, where software metrics obtain the same values, was introduced. Within the intersection point, either one of the architectures can be applied. With the exception of some metrics, an increase in the number of features leads to a value increase of software metrics in microservice software architecture, whilst these values are constant in monolithic software architecture. An increase in the number of features indicated a quality attribute’s importance for the software system should be examined and an appropriate architecture should be selected accordingly. Finally, practical recommendations regarding software architectures in terms of software quality were given. Since each software system needs to meet non-functional in addition to functional requirements, a quality-driven software engineering can be established.},
doi = {10.3390/sym14091824}
}
@inproceedings{4335232,
author = {Heitlager, Ilja and Kuipers, Tobias and Visser, Joost},
booktitle = {6th International Conference on the Quality of Information and Communications Technology (QUATIC 2007)},
title = {A Practical Model for Measuring Maintainability},
year = {2007},
volume = {},
number = {},
pages = {30-39},
keywords = {Software quality;Software maintenance;ISO standards;Communication system software;Software systems;Software testing;IEC standards;Software standards;Communications technology;Software measurement},
doi = {10.1109/QUATIC.2007.8}
}
@inproceedings{4670162,
author = {Mani, Senthil and Sinha, Vibha S. and Sukaviriya, Noi and Ramachandra, Thejaswini},
booktitle = {2008 IEEE International Conference on Web Services},
title = {Using User Interface Design to Enhance Service Identification},
year = {2008},
volume = {},
number = {},
pages = {78-87},
keywords = {User interfaces;Service oriented architecture;Web services;Context modeling;Process design;Application software;Navigation;Specification languages;USA Councils;Software design;SOA;Service Identification;UI Modeling},
doi = {10.1109/ICWS.2008.86}
}
@techreport{bianco_2007,
author = {Bianco, Philip and Kotermanski, Rick and Merson, Paulo},
title = {Evaluating a Service-Oriented Architecture},
month = {Sep},
year = {2007},
number = {CMU/SEI-2007-TR-015},
howpublished = {Carnegie Mellon University, Software Engineering Institute's Digital Library},
url = {https://doi.org/10.1184/R1/6573479.v1},
note = {Accessed: 2024-Mar-13}
}
@article{doi:10.2753/MIS0742-1222260409,
author = {Jae Choi, Derek L. Nazareth and Hemant K. Jain},
title = {Implementing Service-Oriented Architecture in Organizations},
journal = {Journal of Management Information Systems},
volume = {26},
number = {4},
pages = {253-286},
year = {2010},
publisher = {Routledge},
doi = {10.2753/MIS0742-1222260409},
url = {
https://doi.org/10.2753/MIS0742-1222260409
},
eprint = {
https://doi.org/10.2753/MIS0742-1222260409
}
}
@inproceedings{4273267,
author = {Liu, Yanguo and Traore, Issa},
booktitle = {Third International Workshop on Predictor Models in Software Engineering (PROMISE'07: ICSE Workshops 2007)},
title = {Complexity Measures for Secure Service-Oriented Software Architectures},
year = {2007},
volume = {},
number = {},
pages = {11-11},
keywords = {Software measurement;Software architecture;Software systems;Service oriented architecture;Business communication;Security;Software quality;Open source software;Application software;Resists},
doi = {10.1109/PROMISE.2007.4}
}
@inproceedings{5557959,
author = {Azeez, Afkham and Perera, Srinath and Gamage, Dimuthu and Linton, Ruwan and Siriwardana, Prabath and Leelaratne, Dimuthu and Weerawarana, Sanjiva and Fremantle, Paul},
booktitle = {2010 IEEE 3rd International Conference on Cloud Computing},
title = {Multi-tenant SOA Middleware for Cloud Computing},
year = {2010},
volume = {},
number = {},
pages = {458-465},
keywords = {Carbon;Servers;Service oriented architecture;Security;Business;Databases;Cloud computing;multi-tenancy;SaaS;PaaS;Cloud Computing;SOA},
doi = {10.1109/CLOUD.2010.50}
}
@article{Paraiso2016,
author = {Paraiso, Fawaz
and Merle, Philippe
and Seinturier, Lionel},
title = {soCloud: a service-oriented component-based PaaS for managing portability, provisioning, elasticity, and high availability across multiple clouds},
journal = {Computing},
year = {2016},
month = {May},
day = {01},
volume = {98},
number = {5},
pages = {539-565},
abstract = {Multi-cloud computing is a promising paradigm to support very large scale world wide distributed applications. Multi-cloud computing is the usage of multiple, independent cloud environments, which assumed no priori agreement between cloud providers or third party. However, multi-cloud computing has to face several key challenges such as portability, provisioning, elasticity, and high availability. Developers will not only have to deploy applications to a specific cloud, but will also have to consider application portability from one cloud to another, and to deploy distributed applications spanning multiple clouds. This article presents soCloud a service-oriented component-based Platform as a Service for managing portability, elasticity, provisioning, and high availability across multiple clouds. soCloud is based on the OASIS Service Component Architecture standard in order to address portability. soCloud provides services for managing provisioning, elasticity, and high availability across multiple clouds. soCloud has been deployed and evaluated on top of ten existing cloud providers: Windows Azure, DELL KACE, Amazon EC2, CloudBees, OpenShift, dotCloud, Jelastic, Heroku, Appfog, and an Eucalyptus private cloud.},
issn = {1436-5057},
doi = {10.1007/s00607-014-0421-x},
url = {https://doi.org/10.1007/s00607-014-0421-x}
}
@article{killalea2016hidden,
title = {The hidden dividends of microservices},
author = {Killalea, Tom},
journal = {Communications of the ACM},
volume = {59},
number = {8},
pages = {42--45},
year = {2016},
publisher = {ACM New York, NY, USA}
}
@inproceedings{29915612991566,
author = {Perera, Charith and McCormick, Ciaran and Bandara, Arosha K. and Price, Blaine A. and Nuseibeh, Bashar},
title = {Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms},
year = {2016},
isbn = {9781450348140},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2991561.2991566},
doi = {10.1145/2991561.2991566},
abstract = {The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms. They are designed to support different kinds of scenarios, such as smart homes and smart cities. Thus far, privacy concerns have not been explicitly considered by IoT applications and middleware platforms. This is partly due to the lack of systematic methods for designing privacy that can guide the software development process in IoT. In this paper, we propose a set of guidelines, a privacy by-design framework, that can be used to assess privacy capabilities and gaps of existing IoT applications as well as middleware platforms. We have evaluated two open source IoT middleware platforms, namely OpenIoT and Eclipse SmartHome, to demonstrate how our framework can be used in this way.},
booktitle = {Proceedings of the 6th International Conference on the Internet of Things},
pages = {83–92},
numpages = {10},
keywords = {privacy, Software Engineering, Internet of Things},
location = {Stuttgart, Germany},
series = {IoT'16}
}
@misc{EU-DSGVO,
added-at = {2019-09-19T11:05:39.000+0200},
author = {{Verordnung (EU) 2016/679}},
biburl = {https://www.bibsonomy.org/bibtex/27ceec40814c62a8d2938b0bb8693487f/bcoldewey},
description = {EUR-Lex - 32016R0679 - DE - EUR-Lex},
interhash = {7434db135dfcb4d89034bc0409fe260f},
intrahash = {7ceec40814c62a8d2938b0bb8693487f},
keywords = {DSGVO EU Verordnung},
timestamp = {2019-09-19T11:09:10.000+0200},
title = {Verordnung (EU) 2016/679 des Europäischen Parlaments und des Rates vom 27. April 2016 zum Schutz natürlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95/46/EG (Datenschutz-Grundverordnung) (Text von Bedeutung für den EWR)},
year = 2016
}
@inproceedings{9781685,
author = {Mashaly, Bahgat and Selim, Sahar and Yousef, Ahmed H. and Fouad, Khaled M.},
booktitle = {2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)},
title = {Privacy by Design: A Microservices-Based Software Architecture Approach},
year = {2022},
volume = {},
number = {},
pages = {357-364},
keywords = {Data privacy;Privacy;Software architecture;Law;Microservice architectures;Systems architecture;Organizations;Privacy;GDPR;Software Architecture;Microservice;Architecture;Software Design;Regulations;Compliance},
doi = {10.1109/MIUCC55081.2022.9781685}
}
@article{abs210300170,
author = {Rodrigo Laigner and
Yongluan Zhou and
Marcos Antonio Vaz Salles and
Yijian Liu and
Marcos Kalinowski},
title = {Data Management in Microservices: State of the Practice, Challenges,
and Research Directions},
journal = {CoRR},
volume = {abs/2103.00170},
year = {2021},
url = {https://arxiv.org/abs/2103.00170},
eprinttype = {arXiv},
eprint = {2103.00170},
timestamp = {Thu, 04 Mar 2021 17:00:40 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2103-00170.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{10.1007/978-3-319-43949-5_18,
author = {Messina, Antonio
and Rizzo, Riccardo
and Storniolo, Pietro
and Tripiciano, Mario
and Urso, Alfonso},
editor = {Renda, M. Elena
and Bursa, Miroslav
and Holzinger, Andreas
and Khuri, Sami},
title = {The Database-is-the-Service Pattern for Microservice Architectures},
booktitle = {Information Technology in Bio- and Medical Informatics},
year = {2016},
publisher = {Springer International Publishing},
address = {Cham},
pages = {223--233},
abstract = {Monolithic applications are the most common development paradigm but they have some drawback related to the maintenance, upgrading and scaling. Microservice architectures were recently proposed in order to solve some of these issues, because they are simpler to scale and more flexible. Both architectures use a database and this component can act as a component for micro service. In the paper we present a pattern for microservice architecture that uses a database as component, and this pattern is used in an health record application. We explain also the requirements of the database for this pattern and the advantages achieved.},
isbn = {978-3-319-43949-5}
}
@inproceedings{9130516,
author = {Munonye, K. and Martinek, P.},
booktitle = {2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)},
title = {Evaluation of Data Storage Patterns in Microservices Archicture},
year = {2020},
volume = {},
number = {},
pages = {373-380},
keywords = {Enterprise Application Integration(EAI);Microservices;REST API;Shared Databases;Database Per Service},
doi = {10.1109/SoSE50414.2020.9130516}
}
@inproceedings{10.1007/978-3-030-14070-0_26,
author = {da Silva, Hugo Henrique S.
and de F. Carneiro, Glauco
and Monteiro, Miguel P.},
editor = {Latifi, Shahram},
title = {An Experience Report from the Migration of Legacy Software Systems to Microservice Based Architecture},
booktitle = {16th International Conference on Information Technology-New Generations (ITNG 2019)},
year = {2019},
publisher = {Springer International Publishing},
address = {Cham},
pages = {183-189},
isbn = {978-3-030-14070-0}
}
@article{onMicroServices,
author = {Namiot, Dmitry and sneps-sneppe, Manfred},
year = {2014},
month = {09},
pages = {24-27},
title = {On Micro-services Architecture},
volume = {2},
journal = {Interenational Journal of Open Information Technologies}
}
@inproceedings{114533388403355659,
author = {Smid, Antonin and Wang, Ruolin and Cerny, Tomas},
title = {Case study on data communication in microservice architecture},
year = {2019},
isbn = {9781450368438},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3338840.3355659},
doi = {10.1145/3338840.3355659},
booktitle = {Proceedings of the Conference on Research in Adaptive and Convergent Systems},
pages = {261–267},
numpages = {7},
keywords = {system integration, microservices, cloud-computing},
location = {Chongqing, China},
series = {RACS '19}
}
@article{512120123602,
author = {Shamsoddin-Motlagh, Ebrahim},
year = {2012},
month = {12},
title = {A Survey of Service Oriented Architecture Systems Testing},
volume = {3},
journal = {International Journal of Software Engineering \& Applications},
doi = {10.5121/ijsea.2012.3602}
}
@inbook{Mayring2010,
author = {Mayring, Philipp},
editor = {Mey, G{\"u}nter
and Mruck, Katja},
title = {Qualitative Inhaltsanalyse},
booktitle = {Handbuch Qualitative Forschung in der Psychologie},
year = {2010},
publisher = {VS Verlag f{\"u}r Sozialwissenschaften},
address = {Wiesbaden},
pages = {601--613},
isbn = {978-3-531-92052-8},
doi = {10.1007/978-3-531-92052-8_42},
url = {https://doi.org/10.1007/978-3-531-92052-8_42}
}
@article{Khan2023,
author = {Khan, Saad Ullah
and Khan, Abdul Wahid
and Khan, Faheem
and Khan, Jawad
and Lee, Youngmoon},
title = {Factors influencing vendor organizations in the selection of DevOps for global software development: an exploratory study using a systematic literature review},
journal = {Cognition, Technology {\&} Work},
year = {2023},
month = {Nov},
day = {01},
volume = {25},
number = {4},
pages = {411-426},
issn = {1435-5566},
doi = {10.1007/s10111-023-00733-7},
url = {https://doi.org/10.1007/s10111-023-00733-7}
}
@inbook{Witte2023,
author = {Witte, Frank},
title = {Auswahl und Evaluierung geeigneter Tools und Entscheidungsmatrix},
booktitle = {Konzeption und Umsetzung automatisierter Softwaretests: Testautomatisierung zur Optimierung von Testabdeckung und Softwarequalit{\"a}t},
year = {2023},
publisher = {Springer Fachmedien Wiesbaden},
address = {Wiesbaden},
pages = {103--111},
abstract = {Bevor ein Werkzeug zur Unterst{\"u}tzung der Testautomatisierung beschafft wird, ist ein geeigneter Auswahlprozess mit definierten Kriterien zur Bestimmung des geeigneten Tools erforderlich. Die Einbindung der Stakeholder in den Auswahlprozess tr{\"a}gt dabei wesentlich zur Akzeptanz des Tools bei. Zur neutralen Beurteilung empfiehlt sich eine entsprechende Gewichtung der einzelnen Kriterien.},
isbn = {978-3-658-42661-3},
doi = {10.1007/978-3-658-42661-3_12},
url = {https://doi.org/10.1007/978-3-658-42661-3_12}
}
@article{cloudPerspectiveStudy,
author = {Wang Lizhe and von Laszewski Gregor and Kunze Marcel and Tao Jie},
title = {Cloud computing: a perspective study.},
journal = {New Generation Computing 28},
year = {2010}
}
@article{primeScaling,
author = {Marcin Kolny},
title = {Scaling up the Prime Video audio/video monitoring service and reducing costs by 90},
year = {2023}
}
@article{RAZAVIAN2019360,
title = {Empirical research for software architecture decision making: An analysis},
journal = {Journal of Systems and Software},
volume = {149},
pages = {360-381},
year = {2019},
issn = {0164-1212},
doi = {https://doi.org/10.1016/j.jss.2018.12.003},
url = {https://www.sciencedirect.com/science/article/pii/S016412121830267X},
author = {Maryam Razavian and Barbara Paech and Antony Tang},
keywords = {Empirical research, Software architecture, Decision making, Human aspects}
}
%soa compliance
@article{Lotz2008,
author = {Lotz, Volkmar and Pigout, Emmanuel and Fischer, Peter M, and Kossmann, Donald and Massacci, Fabio and Pretschner, Alexander},
title = {Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach},
journal = {WIRTSCHAFTSINFORMATIK},
year = {2008},
month = {Oct},
day = {01},
volume = {50},
number = {5},
pages = {383-391},
issn = {1861-8936},
doi = {10.1007/s11576-008-0086-1},
url = {https://doi.org/10.1007/s11576-008-0086-1}
}
@inproceedings{10.1145/3275219.3275230,
author = {Ren, Zhongshan and Wang, Wei and Wu, Guoquan and Gao, Chushu and Chen, Wei and Wei, Jun and Huang, Tao},
title = {Migrating Web Applications from Monolithic Structure to Microservices Architecture},
year = {2018},
isbn = {9781450365901},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3275219.3275230},
doi = {10.1145/3275219.3275230},
booktitle = {Proceedings of the 10th Asia-Pacific Symposium on Internetware},
articleno = {7},
numpages = {10},
keywords = {application migration, function clustering, microservices, monolithic application},
location = {Beijing, China},
series = {Internetware '18}
}
@incollection{Rajasekar2012-uw,
title = {Micro-services},
booktitle = {Advances in Systems Analysis, Software Engineering, and High
Performance Computing},
author = {Rajasekar, Arcot and Wan, Mike and Moore, Reagan and Schroeder,
Wayne},
publisher = {IGI Global},
pages = {74--93},
year = 2012
}
@inbook{Familiar2015,
author = {Familiar, Bob},
title = {What Is a Microservice?},
booktitle = {Microservices, IoT, and Azure: Leveraging DevOps and Microservice Architecture to Deliver SaaS Solutions},
year = {2015},
publisher = {Apress},
address = {Berkeley, CA},
pages = {9--19},
isbn = {978-1-4842-1275-2},
doi = {10.1007/978-1-4842-1275-2_2},
url = {https://doi.org/10.1007/978-1-4842-1275-2_2}
}
@inproceedings{Conway1967HOWDC,
title = {HOW DO COMMITTEES INVENT},
author = {Melvin E. Conway},
year = {1967},
url = {https://api.semanticscholar.org/CorpusID:55165854}
}
@book{Wolff18a,
address = {Heidelberg},
author = {Wolff, Eberhard},
isbn = {978-3-86490-313-7},
origdate = {2015},
owner = {flint},
pagetotal = {384},
publisher = {dpunkt},
referencetype = {book},
title = {Microservices: Grundlagen flexibler Softwarearchitekturen},
year = 2015
}
@article{Alonso2023,
author = {Alonso, Juncal
and Orue-Echevarria, Leire
and Casola, Valentina
and Torre, Ana Isabel
and Huarte, Maider
and Osaba, Eneko
and Lobo, Jesus L.},
title = {Understanding the challenges and novel architectural models of multi-cloud native applications -- a systematic literature review},
journal = {Journal of Cloud Computing},
year = {2023},
month = {Jan},
day = {12},
volume = {12},
number = {1},
pages = {6},
issn = {2192-113X},
doi = {10.1186/s13677-022-00367-6},
url = {https://doi.org/10.1186/s13677-022-00367-6}
}
@book{Josuttis08,
author = {Josuttis, Nicolai},
isbn = {978-3-89864-476-1},
keywords = {01841 101 book shelf software development soa service architecture middleware enterprise process admin},
publisher = {dpunkt},
timestamp = {2018-04-16T11:48:09.000+0200},
title = {SOA in der Praxis: System-Design f\"{u}r verteilte Gesch\"{a}ftsprozesse},
username = {flint63},
year = 2008
}
@inproceedings{8928192,
author = {Al-Debagy, Omar and Martinek, Peter},
booktitle = {2018 IEEE 18th International Symposium on Computational Intelligence and Informatics (CINTI)},
title = {A Comparative Review of Microservices and Monolithic Architectures},
year = {2018},
volume = {},
number = {},
pages = {000149-000154},
keywords = {Computer architecture;Throughput;Time factors;Testing;Cloud computing;Service-oriented architecture;Concurrent computing;Microservices Architecture;Monolithic Architecture;Performance Evaluation},
doi = {10.1109/CINTI.2018.8928192}
}
@inproceedings{10114511342851134355,
author = {LaToza, Thomas D. and Venolia, Gina and DeLine, Robert},
title = {Maintaining mental models: a study of developer work habits},
year = {2006},
isbn = {1595933751},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1134285.1134355},
doi = {10.1145/1134285.1134355},
abstract = {To understand developers' typical tools, activities, and practices and their satisfaction with each, we conducted two surveys and eleven interviews. We found that many problems arose because developers were forced to invest great effort recovering implicit knowledge by exploring code and interrupting teammates and this knowledge was only saved in their memory. Contrary to expectations that email and IM prevent expensive task switches caused by face-to-face interruptions, we found that face-to-face communication enjoys many advantages. Contrary to expectations that documentation makes understanding design rationale easy, we found that current design documents are inadequate. Contrary to expectations that code duplication involves the copy and paste of code snippets, developers reported several types of duplication. We use data to characterize these and other problems and draw implications for the design of tools for their solution.},
booktitle = {Proceedings of the 28th International Conference on Software Engineering},
pages = {492–501},
numpages = {10},
keywords = {agile software development, code duplication, code ownership, communication, debugging, interruptions},
location = {Shanghai, China},
series = {ICSE '06}
}
@inproceedings{4724537,
author = {Slyngstad, Odd Petter N. and Conradi, Reidar and Babar, M. Ali and Clerc, Viktor and van Vliet, Hans},
booktitle = {2008 15th Asia-Pacific Software Engineering Conference},
title = {Risks and Risk Management in Software Architecture Evolution: An Industrial Survey},
year = {2008},
volume = {},
number = {},
pages = {101-108},
keywords = {Risk management;Software architecture;Computer industry;Computer architecture;Software systems;Software performance;Software maintenance;Software engineering;Open source software;Information science;software architecture;software evolution;risk management;software architecture evaluation},
doi = {10.1109/APSEC.2008.70}
}
@inproceedings{1691406,
author = {Ramachandra, P. and Haeng-Kon Kim and Byeongdo Kang and Yan Ha and Lee, R.},
booktitle = {Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)},
title = {Risk Management through Architecture Design},
year = {2006},
volume = {},
number = {},
pages = {386-395},
keywords = {Risk management;Project management;Costs;Risk analysis;Uncertainty;Computer architecture;Engineering management;Software engineering;Educational institutions;Software architecture},
doi = {10.1109/SERA.2006.60}
}
@book{karrenbrock,
author = {Karrenbrock, Till},
publisher = {Springer Gabler Wiesbaden},
title = {Produktsprache als Determinante der Markenauthentizität},
year = {2023},
doi = {https://doi.org/10.1007/978-3-658-41800-7}
}
@misc{pricecalc,
author = {{Amazon Web Services}},
howpublished = {\url{https://calculator.aws}},
note = {Aufgerufen: 01.07.2024}
}
@inproceedings{10.1145/1774088.1774504,
author = {Chowdhury, Istehad and Zulkernine, Mohammad},
title = {Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?},
year = {2010},
isbn = {9781605586397},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1774088.1774504},
doi = {10.1145/1774088.1774504},
abstract = {It is difficult to detect vulnerabilities until they manifest themselves as security failures in the operational stage of software, because the security concerns are not addressed or known sufficiently early during software development. Complexity, coupling, and cohesion (CCC) related software metrics can be measured during the earlier phases of software development. If empirical relationships can be discovered between CCC metrics and vulnerabilities, these metrics could aid software developers to take proactive actions against potential vulnerabilities in software. In this paper, we conduct an extensive case study on Mozilla Firefox to provide empirical evidence on how vulnerabilities are related to complexity, coupling, and cohesion. We find that CCC metrics are correlated to vulnerabilities at a statistically significant level. We further examine the correlations to determine which level (design or code) of CCC metrics are better indicators of vulnerabilities. We also observe that the correlation patterns are stable across multiple releases of the software. These observations show that CCC metrics can be dependably used as early indicators of vulnerabilities in software.},
booktitle = {Proceedings of the 2010 ACM Symposium on Applied Computing},
pages = {1963–1969},
numpages = {7},
keywords = {vulnerability, software security, software metrics, security, empirical study, coupling, complexity, cohesion},
location = {Sierre, Switzerland},
series = {SAC '10}
}
@article{doi:10.2753/MIS0742-1222240302,
author = {Ken Peffers, Tuure Tuunanen, Marcus A. Rothenberger and Samir Chatterjee},
title = {A Design Science Research Methodology for Information Systems Research},
journal = {Journal of Management Information Systems},
volume = {24},
number = {3},
pages = {45--77},
year = {2007},
publisher = {Routledge},
doi = {10.2753/MIS0742-1222240302}
}
@article{cloudcomputingbenefits,
author = {Sether, Ayob},
year = {2016},
month = {01},
pages = {},
title = {Cloud Computing Benefits},
journal = {SSRN Electronic Journal},
doi = {10.2139/ssrn.2781593}
}
@inbook{Strohmeier2008,
title = {Architektonische Grundlagen},
booktitle = {Informationssysteme im Personalmanagement},
year = {2008},
publisher = {Vieweg+Teubner},
address = {Wiesbaden},
pages = {3--14},
isbn = {978-3-8348-9475-5},
doi = {10.1007/978-3-8348-9475-5_1},
author = {Stefan Strohmeier}
}
@inbook{Paik2017,
author = {Paik, Hye-young
and Lemos, Angel Lagares
and Barukh, Moshe Chai
and Benatallah, Boualem
and Natarajan, Aarthi},
title = {Introduction to Service Oriented Architecture},
booktitle = {Web Service Implementation and Composition Techniques},
year = {2017},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--23},
isbn = {978-3-319-55542-3},
doi = {10.1007/978-3-319-55542-3_1},
url = {https://doi.org/10.1007/978-3-319-55542-3_1}
}
@inproceedings{10061800,
author = {Dürr, Karolin and Lichtenthäler, Robin},
booktitle = {2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)},
title = {An Evaluation of Modeling Options for Cloud-native Application Architectures to Enable Quality Investigations},
year = {2022},
volume = {},
number = {},
pages = {297-304},
keywords = {Cloud computing;Software architecture;Computational modeling;Computer architecture;Distance measurement;Reliability;Standards;cloud-native;modeling;architecture description language;quality evaluation},
doi = {10.1109/UCC56403.2022.00053}
}
@inproceedings{1590147,
author = {Zayaraz, G. and Thambidurai, P.},
booktitle = {2005 Annual IEEE India Conference - Indicon},
title = {Software Architecture Selection Framework Based on Quality Attributes},
year = {2005},
volume = {},
number = {},
pages = {167-170},
keywords = {Software architecture;Decision making;Computer architecture;Software quality;Software systems;Security;Educational institutions;Decision support systems;Failure analysis;Requirements;Quality Attributes;Software Architecture;Decision Making},
doi = {10.1109/INDCON.2005.1590147}
}
@article{afrizal_zein_2024,
title = { Implementation of Service Oriented Architecture in Mobile Applications to Improve System Flexibility, Interoperability, and Scalability },
author = { Afrizal Zein },
year = { 2024 },
doi = { 10.61487/jiste.v2i1.60 }
}
@misc{jing_nie_2013,
title = { A Study on the Application Cost of Server Virtualisation },
author = { Jing Nie },
year = { 2013 },
publisher = { IEEE },
pages = { 807-811 },
doi = { 10.1109/CIS.2013.176 }
}
@inproceedings{8666479,
author = {Shah, Jay and Dubaria, Dushyant},
booktitle = {2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)},
title = {Building Modern Clouds: Using Docker, Kubernetes \& Google Cloud Platform},
year = {2019},
volume = {},
number = {},
pages = {0184-0189},
keywords = {Containers;Cloud computing;Google;Monitoring;Web servers;Cloud;Docker;Kubernetes;Google Cloud Platform;Containers;Orchestration},
doi = {10.1109/CCWC.2019.8666479}
}
@inproceedings{10072238,
author = {Parikh, Aman and Kumar, Pranav and Gandhi, Parshav and Sisodia, Jignesh},
booktitle = {2022 International Conference on Computer, Power and Communications (ICCPC)},
title = {Monolithic to Microservices Architecture - A Framework for Design and Implementation},
year = {2022},
volume = {},
number = {},
pages = {90-96},
doi = {10.1109/ICCPC55978.2022.10072238}
}
@book{Newman:15:MS,
added-at = {2015-09-09T21:30:50.000+0200},
author = {Newman, Sam},
biburl = {https://www.bibsonomy.org/bibtex/261a28f122c347b555b88a0d835080b6a/gron},
description = {Building Microservices: Sam Newman: 9781491950357: Amazon.com: Books},
edition = {1st},
interhash = {cd274e4310da91cad9f07dfbed64cb9f},
intrahash = {61a28f122c347b555b88a0d835080b6a},
isbn = {978-1491950357},
keywords = {Architecture Microservices SOA},
month = {February},
pages = 280,
publisher = {O'Reilly Media},
refid = {903609686},
timestamp = {2015-09-09T21:30:50.000+0200},
title = {Building Microservices: Designing Fine-Grained Systems},
year = 2015
}
@misc{amazon2023,
author = {Kolny, Marcin},
title = {Scaling up the Prime Video audio/video monitoring service and reducing costs by 90\%},
day = {22},
month = {03},
year = {2023},
url = {https://www.primevideotech.com/video-streaming/scaling-up-the-prime-video-audio-video-monitoring-service-and-reducing-costs-by-90},
note = {Aufgerufen am: 15.07.2024, 19:16 Uhr}
}
@misc{itm,
howpublished = {\url{https://oc-digital.de/node/6199}},
title = {Leitfaden zur Gestaltung wissenschaftlicher Arbeiten},
month = {03},
year = {2024},
note = {Aufgerufen am: 17.07.2024},
author = {FOM-Hochschule}
}
@misc{interestInArchitecture,
howpublished = {\url{https://trends.google.de/trends/explore?date=2019-05-01%202024-07-17&q=%2Fm%2F011spz0k,%2Fm%2F0315s4,software%20architecture&hl=de}},
title = {Google-Trends Analyse zu Suchverhalten nach Microservices, SOA und Software Architektur},
note = {Aufgerufen am: 17.07.2024},
author = {Google-Trends}
}
@article{muhammad_iqbal__2023,
title = { Penerapan Monolitic Arsitecture Pada Aplikasi Ujian Online BERBASIS Berbasis Web },
author = { Muhammad Iqbal and Abdul Karim Syahputra and Wiwin Handoko },
year = { 2023 },
volume = { 2 },
pages = { 213-213 },
number = { 2 },
doi = { 10.54314/jpstm.v2i2.1107 }
}
@article{SUGUMAR_2020,
title = {MQTT -A LIGHTWEIGHT COMMUNICATION PROTOCOL RELATIVE STUDY},
url = {http://dx.doi.org/10.22541/au.159076954.48540044},
doi = {10.22541/au.159076954.48540044},
publisher = {Authorea, Inc.},
author = {SUGUMAR, KALAIVANAN},
year = {2020},
month = may
}
@article{williams2008harvard,
title = {The harvard family of bibliography styles},
author = {Williams, Peter and Schnier, Thorsten},
year = {2008},
publisher = {Citeseer}
}
@book{scoring,
author = {Jörg B. Kühnapfel},
publisher = {Springer Gabler Wiesbaden},
title = {Scoring und Nutzwertanalysen},
year = {2021},
doi = {https://doi.org/10.1007/978-3-658-34810-6}
}