Skip to main content
Top

2014 | OriginalPaper | Chapter

13. Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing

Authors : Faria Mehak, Rahat Masood, Yumna Ghazi, Muhammad Awais Shibli, Sharifullah Khan

Published in: Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Database-as-a-Service (DBaaS) provides a wide range of benefits such as data outsourcing, multi-tenancy and resource sharing. It has garnered a lot of hype, but while it is promising, it is also a mine-field of concerns and issues. Security is one of the most critical challenges in this domain, which has only begun to earn the academic attention that it needs. There is a serious lack of research in this area that collectively covers the security of DBaaS, from its various problems to the possible solutions. To this end, this chapter provides a holistic survey on the security aspects of the Cloud DBaaS, including key features, advantages and different compatible architectures for managing data in the Cloud DBaaS. Furthermore, we identify challenges and classify the security limitations in DBaaS paradigm. Security requirements that are being fulfilled by state-of-the-art mechanisms along with their in-depth description are also presented. Additionally, we provide insight to the future security perspective. Our work acts as a comprehensive guidance for the developers and researchers to help them understand the inherent security issues and the existent countermeasures in the DBaaS domain.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Abadi DJ (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng 32(1):2009 Abadi DJ (2009) Data management in the cloud: limitations and opportunities. IEEE Data Eng 32(1):2009
3.
go back to reference Agrawal R, Evfimievski A, Srikant R (2003) Information sharing across private databases. In: Proceedings of the ACM SIGMOD conference, pp 86–97, 2003 Agrawal R, Evfimievski A, Srikant R (2003) Information sharing across private databases. In: Proceedings of the ACM SIGMOD conference, pp 86–97, 2003
4.
go back to reference Agrawal D, Abbadi AEl, Emekci F, Metwally A (2009) Database management as a service: challenges and opportunities, data engineering, ICDE’09. IEEE 25th international conference on IEEE, pp 1709–1716, 2009 Agrawal D, Abbadi AEl, Emekci F, Metwally A (2009) Database management as a service: challenges and opportunities, data engineering, ICDE’09. IEEE 25th international conference on IEEE, pp 1709–1716, 2009
5.
go back to reference Agrawal D, Das S, Abbadi AEl (2011) Big data and cloud computing: current state and future opportunities. Proceedings of the 14th international conference on extending database technology, ACM, pp 530–533, 2011 Agrawal D, Das S, Abbadi AEl (2011) Big data and cloud computing: current state and future opportunities. Proceedings of the 14th international conference on extending database technology, ACM, pp 530–533, 2011
6.
go back to reference Agrawal D, Abbadi AEl, Das S, Elmore AJ (2011) Database scalability, elasticity, and autonomy in the cloud, database systems for advanced applications. Springer, Berlin, pp 1–14 Agrawal D, Abbadi AEl, Das S, Elmore AJ (2011) Database scalability, elasticity, and autonomy in the cloud, database systems for advanced applications. Springer, Berlin, pp 1–14
7.
go back to reference Al Shehri W (2013) Cloud database Database-as-a-Service. Int J Database Manage Syst (IJDMS) 5(2):1–12CrossRef Al Shehri W (2013) Cloud database Database-as-a-Service. Int J Database Manage Syst (IJDMS) 5(2):1–12CrossRef
8.
go back to reference Alzain MA, Pardede E (2011) Using multi shares for ensuring privacy in Database-as-a-Service. Proceedings of 44th Hawaii international conference on system sciences, pp 1–9, 2011 Alzain MA, Pardede E (2011) Using multi shares for ensuring privacy in Database-as-a-Service. Proceedings of 44th Hawaii international conference on system sciences, pp 1–9, 2011
9.
go back to reference AlZain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. 45th Hawaii international conference on system sciences, pp 5490–5499, 2012 AlZain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. 45th Hawaii international conference on system sciences, pp 5490–5499, 2012
10.
go back to reference Amanatidis G, Boldyreva A, O’Neill A (2007) New security models and provably-secure schemes for basic query support in outsourced databases, 2007 Amanatidis G, Boldyreva A, O’Neill A (2007) New security models and provably-secure schemes for basic query support in outsourced databases, 2007
11.
go back to reference Amazon (2006) Amazon web services. Web services licensing agreement, 2006 Amazon (2006) Amazon web services. Web services licensing agreement, 2006
15.
go back to reference Ansari S, Rajeev SG, Chandrashekar HS (2002) Packet sniffing: a brief introduction. Potential IEEE 21(5):17–19CrossRef Ansari S, Rajeev SG, Chandrashekar HS (2002) Packet sniffing: a brief introduction. Potential IEEE 21(5):17–19CrossRef
17.
go back to reference Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
18.
go back to reference Arora I, Gupta A (2012) Cloud databases: a paradigm shift in databases. Int J Comput Sci Issues 9(4):77–83 Arora I, Gupta A (2012) Cloud databases: a paradigm shift in databases. Int J Comput Sci Issues 9(4):77–83
20.
go back to reference Behl A (2011) Emerging security challenges in cloud computing-an insight to cloud security challenges and their mitigation. Information and Communication Technologies (WICT), World Congress on IEEE, pp 217–222, 2011 Behl A (2011) Emerging security challenges in cloud computing-an insight to cloud security challenges and their mitigation. Information and Communication Technologies (WICT), World Congress on IEEE, pp 217–222, 2011
21.
go back to reference Behl A, Behl K (2012) An analysis of cloud computing security issues. Information and Communication Technologies (WICT), World Congress on IEEE, pp 109–114, 2012 Behl A, Behl K (2012) An analysis of cloud computing security issues. Information and Communication Technologies (WICT), World Congress on IEEE, pp 109–114, 2012
22.
go back to reference Beimborn D, Miletzki T, Wenzel S (2011) Platform as a service (PaaS). Bus Inf Syst Eng 3(6):381–384CrossRef Beimborn D, Miletzki T, Wenzel S (2011) Platform as a service (PaaS). Bus Inf Syst Eng 3(6):381–384CrossRef
27.
go back to reference Brown WC, Nyarko K (2012) Software as a service (SaaS), cloud computing service and deployment models: layers and management, 2012 Brown WC, Nyarko K (2012) Software as a service (SaaS), cloud computing service and deployment models: layers and management, 2012
28.
go back to reference Brzeźniak M, Jankowski G, Jankowski M, Jankowski S, Jankowski T, Meyer N, Mikołajczak R, Zawada A, Zdanowski S (2013) National data storage 2: secure storage cloud with efficient and easy data access, 2013 Brzeźniak M, Jankowski G, Jankowski M, Jankowski S, Jankowski T, Meyer N, Mikołajczak R, Zawada A, Zdanowski S (2013) National data storage 2: secure storage cloud with efficient and easy data access, 2013
29.
go back to reference Buneman P, Khanna S, Tan W-C (2000) Data provenance: some basic issues, FST TCS 2000: foundations of software technology and theoretical computer science. Springer, Berlin Buneman P, Khanna S, Tan W-C (2000) Data provenance: some basic issues, FST TCS 2000: foundations of software technology and theoretical computer science. Springer, Berlin
32.
go back to reference Cloud Security Alliance (2012) Top ten big data security and privacy challenges, 2012. Accessed Oct 2013 Cloud Security Alliance (2012) Top ten big data security and privacy challenges, 2012. Accessed Oct 2013
33.
go back to reference Cloud Security Alliance, Cloud Vulnerabilities Working Group (2013) Cloud computing: vulnerability incidents: a statistical overview, 2013 Cloud Security Alliance, Cloud Vulnerabilities Working Group (2013) Cloud computing: vulnerability incidents: a statistical overview, 2013
37.
go back to reference Cooper BF, Ramakrishnan R, Srivastava U, Silberstein A, Bohannon P, Jacobsen HA, Puz N, Weaver D, Yerneni R (2008) PNUTS: Yahoo!’s hosted data serving platform, 2008 Cooper BF, Ramakrishnan R, Srivastava U, Silberstein A, Bohannon P, Jacobsen HA, Puz N, Weaver D, Yerneni R (2008) PNUTS: Yahoo!’s hosted data serving platform, 2008
39.
go back to reference Dillon T, Wu C, Chang E (2012) Cloud computing: issues and challenges. 24th IEEE international conference on advanced information networking and applications, pp 27–33, 2012 Dillon T, Wu C, Chang E (2012) Cloud computing: issues and challenges. 24th IEEE international conference on advanced information networking and applications, pp 27–33, 2012
40.
go back to reference Dimovski D (2013) Database management as a cloud based service for small and medium organizations, Dissertation/master thesis, Masaryk University Brno, 2013 Dimovski D (2013) Database management as a cloud based service for small and medium organizations, Dissertation/master thesis, Masaryk University Brno, 2013
41.
go back to reference Essner J (2011) Security in the Cloud. New Jersey Digital Government Summit, 2011 Essner J (2011) Security in the Cloud. New Jersey Digital Government Summit, 2011
42.
go back to reference Ferrari E (2009) Database-as-a-Service: challenges and solutions for privacy and security, services computing conference, 2009. APSCC 2009. IEEE Asia-Pacific. IEEE, pp 46–51, 2009 Ferrari E (2009) Database-as-a-Service: challenges and solutions for privacy and security, services computing conference, 2009. APSCC 2009. IEEE Asia-Pacific. IEEE, pp 46–51, 2009
43.
go back to reference Ferrari E (2010) Access control in data management systems. Morgan & Claypool, San Rafael Ferrari E (2010) Access control in data management systems. Morgan & Claypool, San Rafael
44.
go back to reference Ferretti L, Colajanni M, Marchetti M (2012) Supporting security and consistency for cloud database. Cyberspace Safe Secur Lect Notes Comput Sci 7672:179–193CrossRef Ferretti L, Colajanni M, Marchetti M (2012) Supporting security and consistency for cloud database. Cyberspace Safe Secur Lect Notes Comput Sci 7672:179–193CrossRef
45.
go back to reference Ge T, Zdonik SB (2007) Answering aggregation queries in a secure system model. In Proceedings of VLDB Conference, pp 519–530, 2007 Ge T, Zdonik SB (2007) Answering aggregation queries in a secure system model. In Proceedings of VLDB Conference, pp 519–530, 2007
46.
go back to reference Gelbstein E (2011) Data integrity-information security’s poor relation. ISACA J 6:2011 Gelbstein E (2011) Data integrity-information security’s poor relation. ISACA J 6:2011
47.
go back to reference Gelogo YE, Lee S (2012) Database management system as a cloud service. Int J Future Gener Commun Netw 5(2):71–76 Gelogo YE, Lee S (2012) Database management system as a cloud service. Int J Future Gener Commun Netw 5(2):71–76
49.
go back to reference Gupta GKr, Sharma AK, Swaroop V (2010) Consistency and security in mobile real time distributed database (MRTDDB): a combinational giant challenge. AIP conference proceedings, vol 1324, 2010 Gupta GKr, Sharma AK, Swaroop V (2010) Consistency and security in mobile real time distributed database (MRTDDB): a combinational giant challenge. AIP conference proceedings, vol 1324, 2010
50.
go back to reference Hacigumus H, Iyer B, Li C, Mehrotra S (2002) Executing SQL over encrypted data in the database service provider model. In: Proceedings of the ACM SIGMOD’200 conference, Madison, Wisconsin, pp 216–227, 2002 Hacigumus H, Iyer B, Li C, Mehrotra S (2002) Executing SQL over encrypted data in the database service provider model. In: Proceedings of the ACM SIGMOD’200 conference, Madison, Wisconsin, pp 216–227, 2002
51.
go back to reference Hacigumus H, Iyer B, Mehrorta S (2002) Providing Database-as-a-Service, ICDE, pp 29–38, 2002 Hacigumus H, Iyer B, Mehrorta S (2002) Providing Database-as-a-Service, ICDE, pp 29–38, 2002
52.
go back to reference Hacigumus H, Iyer B, Mehrotra S (2002) Providing Database-as-a-Service. Proceedings of the 18th international conference on data engineering (ICDE.02), 2002 Hacigumus H, Iyer B, Mehrotra S (2002) Providing Database-as-a-Service. Proceedings of the 18th international conference on data engineering (ICDE.02), 2002
53.
go back to reference Hadavi MA, Noferesti M, Jalili R, Damiani E (2012) Database-as-a-Service: towards a unified solution for security requirements. IEEE 36th international conference on computer software and applications workshops, pp 415–420, 2012 Hadavi MA, Noferesti M, Jalili R, Damiani E (2012) Database-as-a-Service: towards a unified solution for security requirements. IEEE 36th international conference on computer software and applications workshops, pp 415–420, 2012
55.
go back to reference Hogan M (2008) Cloud computing & databases-how databases can meet the demands of Cloud computing, ScaleDB Inc, 2008 Hogan M (2008) Cloud computing & databases-how databases can meet the demands of Cloud computing, ScaleDB Inc, 2008
56.
go back to reference Holden EP, Kang JW, Bills DP, Ilyassov M (2009) Databases in the Cloud: a work in progress. Proceedings of the 10th ACM conference on SIG-information technology education, ACM, pp 138–143, 2009 Holden EP, Kang JW, Bills DP, Ilyassov M (2009) Databases in the Cloud: a work in progress. Proceedings of the 10th ACM conference on SIG-information technology education, ACM, pp 138–143, 2009
58.
go back to reference Kapa KK, Lopez R (2012) Database-as-a-Service (DBaaS) using enterprise manager 12c, Oracle Open World, 2012 Kapa KK, Lopez R (2012) Database-as-a-Service (DBaaS) using enterprise manager 12c, Oracle Open World, 2012
59.
go back to reference Kumar A, Lee HJ, Singh RP (2012) Efficient and secure cloud storage for handling big data, information science and service science and data mining (ISSDM). 6th international conference on new trends in, pp 162–166, 2012 Kumar A, Lee HJ, Singh RP (2012) Efficient and secure cloud storage for handling big data, information science and service science and data mining (ISSDM). 6th international conference on new trends in, pp 162–166, 2012
60.
go back to reference Kumbhare A, Simmhan Y, Prasanna V (2012) Cryptonite: a secure and performant data repository on public clouds, cloud computing (CLOUD), 2012 IEEE 5th international conference on IEEE, pp 510–517, 2012 Kumbhare A, Simmhan Y, Prasanna V (2012) Cryptonite: a secure and performant data repository on public clouds, cloud computing (CLOUD), 2012 IEEE 5th international conference on IEEE, pp 510–517, 2012
61.
go back to reference Lee S (2011) Shared-nothing vs. shared-disk cloud database architecture. Int J Energy Inf Commun 2(4):211–216MATH Lee S (2011) Shared-nothing vs. shared-disk cloud database architecture. Int J Energy Inf Commun 2(4):211–216MATH
64.
go back to reference Liu W (2012) Research on cloud computing security problem and strategy, consumer electronics, communications and networks (CECNet), 2nd international conference on IEEE, pp 1216–1219, 2012 Liu W (2012) Research on cloud computing security problem and strategy, consumer electronics, communications and networks (CECNet), 2nd international conference on IEEE, pp 1216–1219, 2012
66.
go back to reference Mani M, Shah K, Gunda M (2013) Enabling secure Database-as-a-Service using fully homomorphic encryption: challenges and opportunities, DanaC ’13. Proceedings of the second workshop on data analytics in the cloud, pp 1–12, 2013 Mani M, Shah K, Gunda M (2013) Enabling secure Database-as-a-Service using fully homomorphic encryption: challenges and opportunities, DanaC ’13. Proceedings of the second workshop on data analytics in the cloud, pp 1–12, 2013
68.
go back to reference Mateljan V, Cisic D, Ogrizovid D (2010) Cloud Database-as-a-Service (DaaS)-ROI, MIPRO, Opatija, Croatia, pp 1185–1188, 2010 Mateljan V, Cisic D, Ogrizovid D (2010) Cloud Database-as-a-Service (DaaS)-ROI, MIPRO, Opatija, Croatia, pp 1185–1188, 2010
69.
go back to reference McAfee (2012) Data loss by the numbers. White paper, 2012. McAfee (2012) Data loss by the numbers. White paper, 2012.
70.
go back to reference Merkle RC (1989) A certified digital signature, advances in cryptology-CRYPTO ’89. 9th annual international cryptology conference, Santa Barbara, California, USA, Proceedings vol 435, pp 218–238, 1989 Merkle RC (1989) A certified digital signature, advances in cryptology-CRYPTO ’89. 9th annual international cryptology conference, Santa Barbara, California, USA, Proceedings vol 435, pp 218–238, 1989
71.
go back to reference Michel D (2010) Databases in the cloud, Doktorarbeit, HSR University of Applied Science Rapperswil, 2010 Michel D (2010) Databases in the cloud, Doktorarbeit, HSR University of Applied Science Rapperswil, 2010
74.
go back to reference Mitropoulos D (2013) Data security in the cloud environment vol 19, no 3, 2013 Mitropoulos D (2013) Data security in the cloud environment vol 19, no 3, 2013
77.
go back to reference Nithiavathy R (2013) Data integrity and data dynamics with secure storage service in cloud. Proceedings of the 2013 international conference on pattern recognition, informatics and mobile engineering, IEEE, pp 125–130, 2013 Nithiavathy R (2013) Data integrity and data dynamics with secure storage service in cloud. Proceedings of the 2013 international conference on pattern recognition, informatics and mobile engineering, IEEE, pp 125–130, 2013
79.
go back to reference Nuo DB (2013) 12 rules for a cloud data management system (CDMS), Cambridge Massachusetts (PRWEB), 2013 Nuo DB (2013) 12 rules for a cloud data management system (CDMS), Cambridge Massachusetts (PRWEB), 2013
80.
go back to reference Oracle Corporation (2011) Database-as-a-Service: reference architecture-an overview, 2011 Oracle Corporation (2011) Database-as-a-Service: reference architecture-an overview, 2011
85.
go back to reference Pizette L, Cabot T (2012) Database-as-a-Service: a marketplace assessment, pp 1–4, 2012 Pizette L, Cabot T (2012) Database-as-a-Service: a marketplace assessment, pp 1–4, 2012
86.
go back to reference Posey M (2012) Database-as-a-Service: rightsizing database solutions, research vice president, hosting & managed network services, 2012 Posey M (2012) Database-as-a-Service: rightsizing database solutions, research vice president, hosting & managed network services, 2012
87.
go back to reference Reddy Kandukuri B, Ramakrishna PV, Rakshit A (2009) Cloud security issues, IEEE, pp 517–520, 2009 Reddy Kandukuri B, Ramakrishna PV, Rakshit A (2009) Cloud security issues, IEEE, pp 517–520, 2009
88.
go back to reference Sakhi I (2012) Databases security in cloud. Dissertation KTH, 2012 Sakhi I (2012) Databases security in cloud. Dissertation KTH, 2012
91.
go back to reference Sengupta S, Kaulgud V, Sharma VS (2011) Cloud computing security-trends and research directions, services (SERVICES), IEEE World Congress on IEEE, pp 524–531, 2011 Sengupta S, Kaulgud V, Sharma VS (2011) Cloud computing security-trends and research directions, services (SERVICES), IEEE World Congress on IEEE, pp 524–531, 2011
94.
go back to reference Sion R (2005) Query execution assurance for outsourced database. In: Proceedings of VLDB conference, 2005 Sion R (2005) Query execution assurance for outsourced database. In: Proceedings of VLDB conference, 2005
95.
go back to reference Sion R (2007) Secure data outsourcing. In: Proceedings of the CLDB conference, pp 1431–1432, 2007 Sion R (2007) Secure data outsourcing. In: Proceedings of the CLDB conference, pp 1431–1432, 2007
97.
go back to reference Sushil B, Jain L, Jain S (2010) Cloud computing: a study of infrastructure as a service (IAAS). International journal of engineering and information technology 2.1, pp 60–63, 2010 Sushil B, Jain L, Jain S (2010) Cloud computing: a study of infrastructure as a service (IAAS). International journal of engineering and information technology 2.1, pp 60–63, 2010
98.
go back to reference Tianfield H (2012) Security issues in cloud computing. IEEE international conference on systems, man, and cybernetics, pp 1082–1089, 2012 Tianfield H (2012) Security issues in cloud computing. IEEE international conference on systems, man, and cybernetics, pp 1082–1089, 2012
99.
go back to reference Vacca JR (2012) Computer and information security handbook, second edition, Newnes, 2012 Vacca JR (2012) Computer and information security handbook, second edition, Newnes, 2012
101.
go back to reference Wang C, Chow SSM, Wang Q, Kui R, Wenjing L (2013) Privacy preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375MathSciNetCrossRef Wang C, Chow SSM, Wang Q, Kui R, Wenjing L (2013) Privacy preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375MathSciNetCrossRef
102.
go back to reference Weis J, Alves-Foss J (2011) Securing Database-as-a-Service: issues and compromises, security & privacy, IEEE 9.6, pp 49–55, 2011 Weis J, Alves-Foss J (2011) Securing Database-as-a-Service: issues and compromises, security & privacy, IEEE 9.6, pp 49–55, 2011
106.
go back to reference Xu L, Wu X (2013) Hub: heterogeneous bucketization for database outsourcing, cloud computing’13, Hangzhou, China, pp 47–54, 2013 Xu L, Wu X (2013) Hub: heterogeneous bucketization for database outsourcing, cloud computing’13, Hangzhou, China, pp 47–54, 2013
109.
go back to reference Zheng Q, Xu S, Ateniese G (2012) Efficient query integrity for outsourced dynamic databases, CCSW’12, Raleigh, North Carolina, USA, 2012 Zheng Q, Xu S, Ateniese G (2012) Efficient query integrity for outsourced dynamic databases, CCSW’12, Raleigh, North Carolina, USA, 2012
110.
go back to reference Zissis D, Lekkas D (2012) Addressing cloud computing security issues, future generation computer systems 3, pp 583–592, 2012 Zissis D, Lekkas D (2012) Addressing cloud computing security issues, future generation computer systems 3, pp 583–592, 2012
Metadata
Title
Security Aspects of Database-as-a-Service (DBaaS) in Cloud Computing
Authors
Faria Mehak
Rahat Masood
Yumna Ghazi
Muhammad Awais Shibli
Sharifullah Khan
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-10530-7_13

Premium Partner