Event Management Service System

  • Vladyslav Berezhetskyi
  • Artur Tomczak
  • Daniel Soliwoda
  • Emiljana HotiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1035)


The purpose of the study is to estimate and investigate the advantage of using microservices capability, to develop the system with new functionalities without a relatively large interference in the logic of the individual modules. Similarly using another method as alternative as monolithic architecture which is created as independent on development of an application as a set of small independent services. Creating architecture using microservices brings advantages as freedom in choice of technology and focusing on one service and disadvantages such as delays with remote connections or difficulties related to maintaining transaction security. With the example of Event Watcher system presented it is possible to use completely different technologies in the production of microservices. In the results it was found that the application process of mircorservices were easy to manage and REST communication with service easy to be substituted, testers didn’t had to wait for runnable project, they could work with those micro-services which already they had.


  1. 1.
    Xu, C., Zhu, H.: CAOPLE: a programming language for mircroservices SaaS. In: IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 34–43 (2016)Google Scholar
  2. 2.
    Chen, L.: Microservices: Architecting for Continuous Delivery and DevOps (2018)Google Scholar
  3. 3.
    Halili, E.H.: A Practical Beginner’s Guide to Automated Testing and Performance Measurement for Your Websites (2008)Google Scholar
  4. 4.
    Molnár, E., Molnár, R.: Web intelligence in practice. J. Service Sci. Res. 6(1), 149–172 (2014)CrossRefGoogle Scholar
  5. 5.
    Thönes, J.: I.–1, January 2015Google Scholar
  6. 6.
    Kryvinska, N.: Building consistent formal specification for the service enterprise agility foundation. J. Service Sci. Res. 4(2), 235–269 (2012)CrossRefGoogle Scholar
  7. 7.
    Limpiyakorn, R.W.: Development of IT Helpdesk with microservices. In: International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 31–34 (2018)Google Scholar
  8. 8.
    Gregus, M., Kryvinska, N.: Service Orientation of Enterprises - Aspects, Dimensions, Technologies. Comenius University in Bratislava, Bratislava (2015). ISBN 9788022339780Google Scholar
  9. 9.
    Yung, M., Liu, P.: Information Security and Cryptology: Fourth International Conference, Inscrypt 2008, Beijing, China, 14–17 December 2008. Springer, Heidelberg (2009)Google Scholar
  10. 10.
    Masse, M.: REST API Design Rulebook: Designing Consistent RESTful Web Service Interfaces. O’Reilly Media, Inc., Sebastopol (2011)Google Scholar
  11. 11.
    Dmitry, N., Manfred, S.-S.: On micro-services architecture. Int. J. Open Inf. Technol. 2(9), 24–27 (2014)Google Scholar
  12. 12.
    Kryvinska, N., Gregus, M.: SOA and its Business Value in Requirements, Features, Practices and Methodologies. Comenius University in Bratislava, Bratislava (2014). ISBN 9788022337649Google Scholar
  13. 13.
    Kryvinska, N., Kaczor, S.: It is all about services - fundamentals, drivers, and business models. J. Serv. Sci. Res. 5(2), 125–154 (2013)CrossRefGoogle Scholar
  14. 14.
    Newman, S.: Building Microservices: Designing Fine-Grained Systems. O’Reilly Media Inc., Sebastopol (2015)Google Scholar
  15. 15.
    Xiao, Z., Wijegunaratne, I.: Reflections on SOA and microservices. In: 4rth International Conference on Enterprise Systems, pp. 60–67 (2017)Google Scholar
  16. 16.
    Poniszewska-Marańda, A.: Modeling and design of role engineering in development of access control for dynamic information systems. Bull. Polish Acad. Sci. 61(3), 569–580 (2013)Google Scholar
  17. 17.
    Majchrzycka, A., Poniszewska-Marańda, A.: Secure development model for mobile applications. Bull. Polish Acad. Sci. 64(3), 495–503 (2016)Google Scholar
  18. 18.
    Poniszewska-Marańda, A., Rutkowska, R.: Access control approach in public software as a service cloud. In: Zamojski, W., et al. (eds.) Theory and Engineering of Complex Systems and Dependability. Advances in Intelligent and Soft Computing, vol. 365, pp. 381–390. Springer, Heidelberg (2015). ISSN 2194-5357, ISBN 978-3-319-19215-4Google Scholar
  19. 19.
    Tkachenko, R., Izonin, I.: Model and principles for the implementation of neural-like structures based on geometric data transformations. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds.) Advances in Computer Science for Engineering and Education. ICCSEEA 2018. Advances in Intelligent Systems and Computing, vol 754, pp. 578–587. Springer, Cham (2019)Google Scholar
  20. 20.
    Poniszewska-Marańda, A.: Conception approach of access control in heterogeneous information systems using UML. J. Telecommun. Syst. 45(2–3), 177–190 (2010)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Vladyslav Berezhetskyi
    • 1
  • Artur Tomczak
    • 1
  • Daniel Soliwoda
    • 1
  • Emiljana Hoti
    • 2
    Email author
  1. 1.Lodz University of TechnologyLodzPoland
  2. 2.Faculty of ManagementComenius University in BratislavaBratislavaSlovakia

Personalised recommendations