[PDF][PDF] A comprehensive microservice extraction approach integrating business functions and database entities.

D Bajaj, A Goel, SC Gupta - Int. Arab J. Inf. Technol., 2024 - researchgate.net
Cloud application practitioners are building large-scale enterprise applications as
microservices, to leverage scalability, performance, and availability. Microservices …

A framework for migration of microservices based applications to serverless platform with efficient cold start latency

V Raj - Authorea Preprints, 2023 - techrxiv.org
Serverless computing has become a very popular cloud-based solution for designing,
testing and deploying the applications as serverless functions. Serverless computing has …

GTMicro—microservice identification approach based on deep NLP transformer model for greenfield developments

D Bajaj, U Bharti, I Gupta, P Gupta, A Yadav - International Journal of …, 2024 - Springer
Microservice architecture (MSA) has become a new style to modernize monolithic systems.
MSA comprises small, independent, and autonomous services that communicate using …

A systematic multi attributes fuzzy‐based decision‐making to migrate the monolithic paradigm electronic governance applications to new software architecture

NK Tyagi, K Tyagi - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
In the context of electronic governance, traditional monolithic architectures often struggle
with the efficient exchange of information and analytics due to their centralized nature …

Access management solution to corporate service

J Hyytiäinen - 2024 - aaltodoc.aalto.fi
This master's thesis introduces identity and access management methods as part of IT
security activities, examines how different identity and access management methods are …

Zero Trust Security for microservices in scalable systems

JMJ Silva - 2024 - recipp.ipp.pt
In the dynamic landscape of contemporary cybersecurity, the Zero Trust model has emerged
as a pivotal paradigm, revolutionizing conventional notions of network trust. This thesis …

Efficient Security for Resource-Constrained Devices with LPM: A Lightweight Protocol Utilizing Chaotic Map-Based S-Box

K Ramesh - 2024 - papers.ssrn.com
The growing use of resource-constrained devices, such as RFID tags, demands lightweight
encryption algorithms. However, current algorithms are not suitable for these devices. We …

Internet of Things: Architecture, Technologies, Applications, and Challenges

S Abdulazeez, AK Nawar, NB Hassan… - AlKadhim Journal for …, 2024 - jkceas.iku.edu.iq
A subset of cutting-edge information technology is the Internet of things (IoT). IoT refers to a
network of physical objects with sensors attached that are linked to the Internet via LAN and …