scholarly journals Information and Communication Security Mechanisms For Microservices-based Systems

2021 ◽  
Vol 13 (6) ◽  
pp. 85-103
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.

2021 ◽  
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

The microservices architecture tries to deal with the challenges posed by distributed systems, such as scalability, availability, and system deployment; by means of highly cohesive, heterogeneous, and independent microservices. However, this architecture also brings new security challenges related to communication, system design, development, and operation. The literature contains spread information regarding security related solutions for microservicesbased systems, but this spread makes difficult for practitioners to adopt novel security related solutions. In this study, we aim to present a catalogue of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, also considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 71 security solutions for the communication of microservices.


2018 ◽  
Vol 14 (12) ◽  
pp. 155014771881505 ◽  
Author(s):  
Manar Abu Talib ◽  
Sohail Abbas ◽  
Qassim Nasir ◽  
Mohamad Fouzi Mowakeh

2019 ◽  
Vol 13 ◽  
pp. 67-75
Author(s):  
Muhammad Abdullahi Maigari ◽  
Uthman Abdullahi Abdul-Qadir

This paper examines the abduction of the schoolgirls in Chibok Local Government Area of Borno State, Nigeria in 2014. The paper examined how the abduction of the schoolgirls generated responses and support for the rescue of the abducted girls from people and organization from different parts of the globe. The Islamists terrorist organization operating in Borno State has attracted the attention of the world since 2009 when they started attacking government establishments and security installations northeast which later escalated to major cities in Northern Nigeria. Methodologically, the paper utilized secondary sources of data to analyze the phenomenon studied. The paper revealed that the development and innovations in information and communication technology which dismantled traditional and colonial boundaries enabled people to express support, solidarity and assist victims of conflict who resides millions of Kilometers away. This shows that Internet-based communications technology has reduced the distance of time and space that characterised traditional mass media. The campaign for the release of the schoolgirls on the social media platforms particularly Twitter and Facebook has tremendously contributed to the release of some of them. Furthermore, the girls freed from abduction have received proper attention: education and reintegration programmes which enable them to start post-abduction life. In this regard, social media has become a tool for supporting the government in moments of security challenges which the Bring Back Our Girls campaign attracted foreign and domestic assistance to Nigeria in the search of the abducted girls and the fight against the Islamist insurgents.


Author(s):  
Apolinar Trejo-Cuevas ◽  
Gerardo Parra-Rodríguez ◽  
María Teresa Díaz-Robledo ◽  
Javier Jesús Torres-Yáñez

Objective. Implement a website that allows the outreach of the science of Information and Communication Technologies to the staff of the university community of the UTNG to facilitate digital inclusion, taking advantage of the current infrastructure that the university has, as well as its human capital. Methodology. The adopted development model was a concurrent model: For the Frontend development the spiral model was used, which facilitates its design through the stages of prototyping, analysis and design. On the other hand, for the development of the Backend, the waterfall model was used, given the nature of the project, where the requirements are pre-established and with few changes. The phases of this model are: (Requirements. Survey of requirements, Design. Development of the database and class diagrams, Implementation Coding, Check. Tests, Maintenance. Correct errors in functionality) Contribution. Implementation of project-based learning (PBL) as a motivational teaching strategy in the development of web applications. Use of robust development tools used today by software factories, such as: Java, Spring, HTML5, CSS3, and Apache Maven; all this under a Model View Controller architecture.


2021 ◽  
Author(s):  
Rita Latikka ◽  
Rosana Rubio-Hernández ◽  
Elena Simona Lohan ◽  
Juho Rantala ◽  
Fernando Nieto Fernández ◽  
...  

BACKGROUND Loneliness and social isolation can have severe effects on human health and well-being. Partial solutions to combat these circumstances in demographically aging societies have been sought from the field of information and communication technology (ICT). OBJECTIVE This systematic literature review investigates the research conducted on older adults’ loneliness and social isolation, and physical ICTs, namely robots, wearables, and smart homes, in the era of ambient assisted living (AAL). The aim is to gain insight into how technology can help overcome loneliness and social isolation other than by fostering social communication with people and what the main open-ended challenges according to the reviewed studies are. METHODS The data were collected from 7 bibliographic databases. A preliminary search resulted in 1271 entries that were screened based on predefined inclusion criteria. The characteristics of the selected studies were coded, and the results were summarized to answer our research questions. RESULTS The final data set consisted of 23 empirical studies. We found out that ICT solutions such as smart homes can help detect and predict loneliness and social isolation, and technologies such as robotic pets and some other social robots can help alleviate loneliness to some extent. The main open-ended challenges across studies relate to the need for more robust study samples and study designs. Further, the reviewed studies report technology- and topic-specific open-ended challenges. CONCLUSIONS Technology can help assess older adults’ loneliness and social isolation, and alleviate loneliness without direct interaction with other people. The results are highly relevant in the COVID-19 era, where various social restrictions have been introduced all over the world, and the amount of research literature in this regard has increased recently.


1970 ◽  
Vol 2 (2) ◽  
pp. 107-121
Author(s):  
Elizabeth Landa ◽  
Chang Zhu ◽  
Jennifer Sesabo

For obtaining benefits from using Information and Communication Technology (ICT) in education sector, technical and management aspects related to the use of ICT are needed. This literature review article focuses on assessing managerial aspects that influence deployment of e-learning technologies. Provision of details in each managerial dimension attempted to cover description of their significance, and the extent to which they influence adoption and usage of e-learning technologies. Key considerations were also extracted and presented as benchmarks for smooth practicality. A stock of existing literature n=81 devoted to the study, were reviewed to capture the specific themes for extracting arguments to acquire a wider perspective of the findings. The downloaded literature was categorised thematically and timely to capture a review of themes and trends on appreciable increase of usage or adoption published respectively. The process supported by NVivo software (version 12). From the findings training seemed the most discussed and considered managerial factor in terms of its significance and influence. It might be so due to its nature and need as it has to be conducted from the initial stage and continuously. The literature seems to be concerned with managerial aspects facilitating e-learning technologies in a holistic way, for stance combining different aspects of training, ultimately reflecting a high level of training aspect analysed. Still, despite some of these aspects being dubbed ‘all inclusive’, many tend to be little reported if we consider the possibilities in terms of those managerial dimensions.


Sign in / Sign up

Export Citation Format

Share Document