Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Pick a Flavour: Towards Sustainable Deployment of Cloud-Edge Applications
- Roberto Amadini,
- Simone Gazza,
- Jacopo Soldani,
- Monica Vitali,
- Antonio Brogi,
- Stefano Forti,
- Saverio Giallorenzo,
- Pierluigi Plebani,
- Francisco Ponce,
- Gianluigi Zavattaro
Logic-Based Program Synthesis and TransformationSep 2024, Pages 117–127https://doi.org/10.1007/978-3-031-71294-4_7AbstractMulti-component Cloud-Edge applications, which rely on the Internet of Things, call for suitable and sustainable management techniques. On one hand, they have to guarantee their hardware and Quality of Service requirements over large-scale Cloud-...
- ArticleSeptember 2024
Towards Teamwise Informed Decisions On Microservice Security Smells
AbstractSecurity smells, i.e., possible symptoms of bad security decisions, can occur in microservice-based applications, potentially resulting in violations of key security properties. The decision of whether or not to refactor a service to mitigate the ...
- articleJuly 2024
An Interview with Massimiliano Di Penta - 2024 SIGSOFT Awardee
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 49, Issue 3July 2024, Pages 17–18https://doi.org/10.1145/3672089.3672093Massimiliano Di Penta received the 2024 SIGSOFT Early Career Researcher Award for outstanding service to the software engineering community, including serving as program co-chair for all premier software engineering conferences and several other events. ...
- research-articleJune 2024
Triaging Microservice Security Smells, with TriSS
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringJune 2024, Pages 698–706https://doi.org/10.1145/3661167.3661282Securing microservice applications is crucial. Security smells denote symptoms of bad –often unintentional– design decisions, which may result in violating security properties, and that can be resolved via refactoring. Stakeholders take into account the ...
- Work in ProgressJuly 2024
Towards enabling observability of energy demand, with NEST
- Alessandro Bocci,
- Antonio Brogi,
- Gianpaolo Cugola,
- Stefano Forti,
- Luca Mottola,
- Virginia Pilloni,
- Sabrina Romano,
- Jacopo Soldani,
- Elio Usai
FRAME '24: Proceedings of the 4th Workshop on Flexible Resource and Application Management on the EdgeJune 2024, Pages 5–6https://doi.org/10.1145/3659994.3660314This work-in-progress paper introduces the project "Network for Energy Sustainable Transition" (NEST), whose overall objective is to conceive technologies facilitating the conversion and utilisation of renewable sources, ensuring sustainability across ...
-
- short-paperJuly 2024
Towards Sustainable Deployment of Microservices over the Cloud-IoT Continuum, with FREEDA
- Jacopo Soldani,
- Roberto Amadini,
- Antonio Brogi,
- Stefano Forti,
- Saverio Giallorenzo,
- Pierluigi Plebani,
- Monica Vitali,
- Gianluigi Zavattaro
FRAME '24: Proceedings of the 4th Workshop on Flexible Resource and Application Management on the EdgeJune 2024, Pages 1–4https://doi.org/10.1145/3659994.3660311This position paper introduces FREEDA, a research project aimed at supporting DevOps engineers in achieving failure-resilient and sustainable deployments of microservice-based applications over the Cloud-IoT computing continuum. After providing the ...
- research-articleApril 2024
A Systematic Technology Review of General-Purpose Open-Source TOSCA Orchestrators
- Miles Stötzner,
- Steffen Becker,
- Lukas Harzenetter,
- Frank Leymann,
- Benjamin Weder,
- Uwe Breitenbücher,
- Oliver Kopp,
- Kevin Klein,
- Jacopo Soldani
UCC '23: Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud ComputingDecember 2023, Article No.: 6, Pages 1–11https://doi.org/10.1145/3603166.3632130The manual deployment of applications distributed across the cloud, fog, and edge is error-prone and complex. TOSCA is a standard for modeling the deployment of cloud applications in a vendor-neutral and technology-independent manner that is also ...
- ArticleMarch 2024
Smelling Homemade Crypto Code in Microservices, with KubeHound
Service-Oriented Computing – ICSOC 2023 WorkshopsNov 2023, Pages 317–324https://doi.org/10.1007/978-981-97-0989-2_27AbstractMicroservices are pervading enterprise IT, and securing microservices hence became crucial. KubeHound is an open-source tool devised for this purpose, as it enables detecting instances of so-called security smells in microservice applications ...
- articleOctober 2023
An Interview with Gail Murphy - 2023 SIGSOFT Awardee
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 48, Issue 4October 2023, Pages 37–38https://doi.org/10.1145/3617946.3617952Gail Murphy received the 2023 SIGSOFT Outstanding Research Award for pioneering contributions to recommenders for software engineering and program comprehension that have impacted both theory and practice. She received a Ph.D. in computer science from ...
- ArticleJuly 2024
Tools Reconstructing Microservice Architecture: A Systematic Mapping Study
Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral SymposiumSep 2023, Pages 3–18https://doi.org/10.1007/978-3-031-66326-0_1AbstractVarious tools have been developed to reconstruct the microservice system architecture. Some of the main reasons to build yet another architectural reconstruction tool are the lack of features to satisfy the current needs or the fact that ...
- articleAugust 2023
yRCA: An explainable failure root cause analyser▪
Science of Computer Programming (SCPR), Volume 230, Issue CAug 2023https://doi.org/10.1016/j.scico.2023.102997AbstractModern applications integrate heterogeneous microservices that can fail due to different reasons. Determining the root causes of microservices' failures and explaining how failures propagate across microservices are hence two crucial ...
Highlights- Explaining why microservices failed is crucial nowadays.
- We introduce yRCA, an ...
- articleJune 2023
An Interview with John Grundy - 2023 SIGSOFT Awardee
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 48, Issue 3July 2023, Pages 18–19https://doi.org/10.1145/3599975.3599982John Grundy received the 2023 SIGSOFT Distinguished Service Award for continued outstanding service to the software engineering community, including the repeated successful organization of flagship conferences, and leadership in the Australasian ...
- articleJune 2023
An Interview with Chunyang Chen - 2023 SIGSOFT Awardee
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 48, Issue 3July 2023, Pages 16–17https://doi.org/10.1145/3599975.3599981Chunyang Chen received the 2023 SIGSOFT Early Career Researcher Award for outstanding contributions to the study of intelligent software development automation including automated mobile application development, software testing, migration, and ...
- research-articleApril 2023
- research-articleOctober 2022
Smells and refactorings for microservices security: A multivocal literature review
Journal of Systems and Software (JSSO), Volume 192, Issue COct 2022https://doi.org/10.1016/j.jss.2022.111393Abstract Context:Securing microservices is crucial, as many IT companies are delivering their businesses through microservices. If security “smells” affect microservice-based applications, they can possibly suffer from security ...
Highlights- Multivocal review capturing the state of the art/practice in securing microservices.
- articleSeptember 2022
An interview with Miryung Kim - 2022 SIGSOFT Awardee
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 47, Issue 4October 2022, Pages 32–33https://doi.org/10.1145/3561846.3561855Miryung Kim received the 2022 SIGSOFT Influential Educator Award for outstanding achievements in undergraduate and graduate mentoring with emphasis on research excellence in software engineering, diversity, and inclusion. She received a Ph.D. in ...
- articleSeptember 2022
Software Engineering After the COVID-19 Outbreak
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 47, Issue 4October 2022, Page 7https://doi.org/10.1145/3561846.3561848Software Engineering (SE) has evolved over many decades and has led to many proven and well-established methods and tools that support the efficient development of software and IT systems in general. Although software development had often been ...
- ArticleJuly 2023
Microservices Security: Bad vs. Good Practices
Software Architecture. ECSA 2022 Tracks and WorkshopsSep 2022, Pages 337–352https://doi.org/10.1007/978-3-031-36889-9_23AbstractThe microservice architectural style is widespread in enterprise IT, making the securing of microservices a crucial issue. Many bad practices in securing microservices have been identified by researchers and practitioners, along with security good ...
- ArticleSeptember 2022
Should Microservice Security Smells Stay or be Refactored? Towards a Trade-off Analysis
AbstractSecuring microservice-based applications is crucial, as many IT companies are delivering their businesses through microservices. Security smells, i.e. possible symptoms of (often unintentional) bad design decisions, can occur in microservice-based ...