[PDF][PDF] A comprehensive microservice extraction approach integrating business functions and database entities.
Cloud application practitioners are building large-scale enterprise applications as
microservices, to leverage scalability, performance, and availability. Microservices …
microservices, to leverage scalability, performance, and availability. Microservices …
A framework for migration of microservices based applications to serverless platform with efficient cold start latency
V Raj - Authorea Preprints, 2023 - techrxiv.org
Serverless computing has become a very popular cloud-based solution for designing,
testing and deploying the applications as serverless functions. Serverless computing has …
testing and deploying the applications as serverless functions. Serverless computing has …
GTMicro—microservice identification approach based on deep NLP transformer model for greenfield developments
Microservice architecture (MSA) has become a new style to modernize monolithic systems.
MSA comprises small, independent, and autonomous services that communicate using …
MSA comprises small, independent, and autonomous services that communicate using …
A systematic multi attributes fuzzy‐based decision‐making to migrate the monolithic paradigm electronic governance applications to new software architecture
NK Tyagi, K Tyagi - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
In the context of electronic governance, traditional monolithic architectures often struggle
with the efficient exchange of information and analytics due to their centralized nature …
with the efficient exchange of information and analytics due to their centralized nature …
Access management solution to corporate service
J Hyytiäinen - 2024 - aaltodoc.aalto.fi
This master's thesis introduces identity and access management methods as part of IT
security activities, examines how different identity and access management methods are …
security activities, examines how different identity and access management methods are …
Zero Trust Security for microservices in scalable systems
JMJ Silva - 2024 - recipp.ipp.pt
In the dynamic landscape of contemporary cybersecurity, the Zero Trust model has emerged
as a pivotal paradigm, revolutionizing conventional notions of network trust. This thesis …
as a pivotal paradigm, revolutionizing conventional notions of network trust. This thesis …
Efficient Security for Resource-Constrained Devices with LPM: A Lightweight Protocol Utilizing Chaotic Map-Based S-Box
K Ramesh - 2024 - papers.ssrn.com
The growing use of resource-constrained devices, such as RFID tags, demands lightweight
encryption algorithms. However, current algorithms are not suitable for these devices. We …
encryption algorithms. However, current algorithms are not suitable for these devices. We …
Internet of Things: Architecture, Technologies, Applications, and Challenges
A subset of cutting-edge information technology is the Internet of things (IoT). IoT refers to a
network of physical objects with sensors attached that are linked to the Internet via LAN and …
network of physical objects with sensors attached that are linked to the Internet via LAN and …