{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:05:42Z","timestamp":1772197542235,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland (SFI) Strategic Partnerships Programme","doi-asserted-by":"publisher","award":["16\/SPP\/3296"],"award-info":[{"award-number":["16\/SPP\/3296"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Origin Enterprises plc"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3260147","type":"journal-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T20:05:02Z","timestamp":1679429102000},"page":"28840-28855","source":"Crossref","is-referenced-by-count":15,"title":["A Survey on Microservices Trust Models for Open Systems"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-6428-8782","authenticated-orcid":false,"given":"Zhongyi","family":"Lu","sequence":"first","affiliation":[{"name":"School of Computer Science, University College Dublin, Dublin 4, Ireland"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-7028-3307","authenticated-orcid":false,"given":"Declan T.","family":"Delaney","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, University College Dublin, Dublin 4, Ireland"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-5702-4463","authenticated-orcid":false,"given":"David","family":"Lillis","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Dublin 4, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3183628.3183631"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT42901.2018.9012140"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2006.275822"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.054"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-019-00407-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-016-0337-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.24"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100415"},{"key":"ref9","first-page":"49","article-title":"Trust as a commodity","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Dasgupta","year":"2000"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s17061346"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2016.15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00081"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7868163"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3561381"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.362"},{"key":"ref16","volume-title":"Service-Oriented Computing: Semantics, Processes, Agents","author":"Singh","year":"2005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2933518"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS49614.2020.00030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90034-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-1955-2_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.1996.558485"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316509"},{"key":"ref24","first-page":"529","article-title":"An agent-based approach to component management","volume-title":"Proc. 8th Int. Conf. Auto. Agents Multi-Agent Syst. (AAMAS)","author":"Lillis"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/wics.8"},{"key":"ref26","volume-title":"SOA Principles of Service Design","author":"Erl","year":"2007"},{"key":"ref27","volume-title":"Web Services Architecture, W3C Note, W3C","author":"Ferris","year":"2004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C.2019.00041"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref30","volume-title":"Domain-Driven Design: Tackling Complexity in the Heart of Software","author":"Evans","year":"2004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-1568-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111393"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45234-0_39"},{"key":"ref34","volume-title":"Zero Trust Networks: Building Secure Systems in Untrusted Networks","author":"Evan","year":"2017"},{"key":"ref35","first-page":"3971","article-title":"Automatic policy generation for inter-service access control of microservices","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Li"},{"key":"ref36","volume-title":"How microservices are changing the security landscape","author":"Shmeleva","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9947347"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.22"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314349"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.09.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.090804"},{"key":"ref42","volume-title":"Zero-trust architectures","author":"Scoppetta","year":"2022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00097"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6476274"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1111\/deci.12506"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0562-5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02874-x"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.030"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.110.2100029"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2007.63"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-014-1412-2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.030"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.12.015"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.03.008"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/11872283_15"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376110"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.36"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2426185"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2015.12.003"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.05.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0138-1"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.009"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3097980"},{"key":"ref65","volume-title":"End-to-end security in service-oriented architecture","author":"Azarmi","year":"2016"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/071L18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/BDEE52938.2021.00038"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2011.6182113"},{"issue":"3","key":"ref69","first-page":"119","article-title":"QoS for web services: Requirements and possible approaches","volume":"25","author":"Lee","year":"2003","journal-title":"W3C Work. Group Note"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.16"},{"key":"ref71","volume-title":"Quality of Service","year":"2022"},{"key":"ref72","first-page":"402","article-title":"RFT: Scalable and fault-tolerant microservices for the O-RAN control plane","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Huff"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10077578.pdf?arnumber=10077578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T15:21:33Z","timestamp":1707837693000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/10077578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":72,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/access.2023.3260147","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}