{"id":"https://openalex.org/W4387042893","doi":"https://doi.org/10.1109/icsecs58457.2023.10256409","title":"An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion Paper","display_name":"An Overview Analysis of Authentication Mechanism in Microservices-Based Software Architecture: A Discussion Paper","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4387042893","doi":"https://doi.org/10.1109/icsecs58457.2023.10256409"},"language":"en","primary_location":{"id":"doi:10.1109/icsecs58457.2023.10256409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsecs58457.2023.10256409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092942626","display_name":"Chang Hoong Jack","orcid":"https://orcid.org/0009-0003-0614-7521"},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Chang Hoong Jack","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Department of Software Engineering And Technology,Kuala Lumpur,Malaysia","Department of Software Engineering And Technology, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia"],"raw_orcid":"https://orcid.org/0009-0003-0614-7521","affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Department of Software Engineering And Technology,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Department of Software Engineering And Technology, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092942627","display_name":"See Kwee Teck","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"See Kwee Teck","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Department of Information System And Security,Kuala Lumpur,Malaysia","Department of Information System And Security, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Department of Information System And Security,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Department of Information System And Security, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036262415","display_name":"Lim Tong Ming","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Lim Tong Ming","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Department of Centre For Business Incubation And Entrepreneurial Venture,Kuala Lumpur,Malaysia","Department of Centre For Business Incubation And Entrepreneurial Venture, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Department of Centre For Business Incubation And Entrepreneurial Venture,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Department of Centre For Business Incubation And Entrepreneurial Venture, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113008738","display_name":"Ding Ying Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I927443849","display_name":"Tunku Abdul Rahman University of Management and Technology","ror":"https://ror.org/03b3zvp63","country_code":"MY","type":"education","lineage":["https://openalex.org/I927443849"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ding Ying Hong","raw_affiliation_strings":["Tunku Abdul Rahman University of Management and Technology,Department of Software Engineering And Technology,Kuala Lumpur,Malaysia","Department of Software Engineering And Technology, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tunku Abdul Rahman University of Management and Technology,Department of Software Engineering And Technology,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I927443849"]},{"raw_affiliation_string":"Department of Software Engineering And Technology, Tunku Abdul Rahman University of Management and Technology, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I927443849"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092942626"],"corresponding_institution_ids":["https://openalex.org/I927443849"],"apc_list":null,"apc_paid":null,"fwci":0.9811,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7740593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.9064786434173584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7827500104904175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5790152549743652},{"id":"https://openalex.org/keywords/software-architecture","display_name":"Software architecture","score":0.434843510389328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4337961673736572},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.42416879534721375},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.4146627187728882},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3675879240036011},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21860277652740479},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21700790524482727},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.1951359212398529},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.10419994592666626},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.09033188223838806}],"concepts":[{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.9064786434173584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7827500104904175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5790152549743652},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.434843510389328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4337961673736572},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.42416879534721375},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.4146627187728882},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3675879240036011},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21860277652740479},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21700790524482727},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.1951359212398529},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.10419994592666626},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.09033188223838806},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsecs58457.2023.10256409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsecs58457.2023.10256409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2622214451","https://openalex.org/W2766248701","https://openalex.org/W2771085576","https://openalex.org/W2804174676","https://openalex.org/W2810733389","https://openalex.org/W2849203795","https://openalex.org/W2895234141","https://openalex.org/W2966315919","https://openalex.org/W3114452056","https://openalex.org/W3135042663","https://openalex.org/W3135443873"],"related_works":["https://openalex.org/W3183504940","https://openalex.org/W4221075750","https://openalex.org/W3183048213","https://openalex.org/W4237290840","https://openalex.org/W3114080539","https://openalex.org/W4309402661","https://openalex.org/W3028364416","https://openalex.org/W2593390545","https://openalex.org/W2594649443","https://openalex.org/W2625935803"],"abstract_inverted_index":{"Microservices-based":[0],"software":[1,11,97,133,159],"architecture":[2,160],"promotes":[3],"scalability":[4],"and":[5,16,21,67,73,88,116,125,142,155],"flexibility":[6],"by":[7],"breaking":[8],"down":[9],"a":[10,33,147],"application":[12],"into":[13],"smaller":[14],"modules":[15],"making":[17],"it":[18],"more":[19],"independent":[20],"loosely":[22],"coupled":[23],"services":[24,68],"compared":[25],"to":[26,61,83,151],"monolith":[27],"systems.":[28],"However,":[29],"securing":[30],"microservices":[31,56],"in":[32,54,95,131],"distributed":[34],"nature":[35],"has":[36],"become":[37],"one":[38,44],"of":[39,45,127,140,157],"the":[40,46,55,75,92,123,138,143,153],"challenges.":[41],"Authentication":[42],"is":[43,161],"most":[47],"critical":[48],"components":[49],"that":[50,63],"should":[51],"be":[52],"focused":[53],"security":[57,156],"measures.":[58],"It":[59,135],"helps":[60],"identify":[62],"only":[64],"authenticated":[65],"personnel":[66],"can":[69],"access":[70],"sensitive":[71],"information":[72],"secure":[74],"trust":[76],"between":[77],"microservices.":[78],"This":[79,120],"discussion":[80],"paper":[81],"aims":[82],"provide":[84],"an":[85],"overview":[86],"analysis":[87],"extensive":[89],"understanding":[90],"on":[91],"authentication":[93,105,115,129,141,149],"mechanism":[94,150],"microservices-based":[96,132,158],"architecture.":[98,134],"In":[99],"this":[100],"study,":[101],"we":[102],"explore":[103],"different":[104,128],"mechanisms":[106,130],"including":[107],"Mutual":[108],"Transport":[109],"Layer":[110],"Security":[111],"(mTLS),":[112],"Token":[113],"based":[114],"API":[117],"Gateway":[118],"authentication.":[119],"study":[121],"examines":[122],"strengths":[124],"limitations":[126],"also":[136],"emphasizes":[137],"importance":[139],"need":[144],"for":[145],"having":[146],"well-designed":[148],"ensure":[152],"integrity":[154],"crucial.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-30T09:15:22.047038","created_date":"2025-10-10T00:00:00"}
