{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:41:25Z","timestamp":1743064885561,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_1","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"3-10","source":"Crossref","is-referenced-by-count":6,"title":["Data Security Issues in Cloud Scenarios"],"prefix":"10.1007","author":[{"given":"Sabrina De Capitani","family":"di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"key":"1_CR1","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: a distributed architecture for secure database services. In: Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, CA, USA, January 2005"},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TSC.2010.29","volume":"4","author":"C Ardagna","year":"2011","unstructured":"Ardagna, C., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P., Verdicchio, M.: Expressive and deployable access control in open web service applications. IEEE Trans. Serv. Comput. (TSC) 4(2), 96\u2013109 (2011)","journal-title":"IEEE Trans. Serv. Comput. (TSC)"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00607-013-0348-7","volume":"97","author":"CA Ardagna","year":"2013","unstructured":"Ardagna, C.A., Jhawar, R., Piuri, V.: Dependability certification of services: a model-based approach. Computing 97(1), 51\u201378 (2013)","journal-title":"Computing"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ardagna, C., Jajodia, S., Samarati, P., Stavrou, A.: Providing users\u2019 anonymity in mobile hybrid networks. ACM Trans. Internet Technol. (TOIT) 12(3), Article 7, 1\u201333, May 2013","DOI":"10.1145\/2461321.2461322"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 2005","DOI":"10.1145\/1102120.1102147"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"12:1","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 12:1\u201312:34 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Bowers, K., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, IL, USA, November 2009","DOI":"10.1145\/1653662.1653686"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM 2011), Shanghai, China, April 2011","DOI":"10.1109\/INFCOM.2011.5935306"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A Ceselli","year":"2005","unstructured":"Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(1), 119\u2013152 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-74835-9_12","volume-title":"Computer Security \u2013 ESORICS 2007","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171\u2013186. Springer, Heidelberg (2007)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440\u2013455. Springer, Heidelberg (2009)"},{"issue":"3","key":"1_CR12","doi-asserted-by":"publisher","first-page":"22:1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(3), 22:1\u201322:33 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-31540-4_24","volume-title":"Data and Applications Security and Privacy XXVI","author":"S Capitani di Vimercati De","year":"2012","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G.: Enforcing subscription-based authorization policies in cloud scenarios. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 314\u2013329. Springer, Heidelberg (2012)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2013.01.008","volume":"39","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodiac, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47\u201363 (2013)","journal-title":"Comput. Secur."},{"issue":"6","key":"1_CR15","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TDSC.2013.2295798","volume":"11","author":"S Capitani di Vimercati De","year":"2014","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE Trans. Dependable Secure Comput. (TDSC) 11(6), 510\u2013523 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput. (TDSC)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Integrity for distributed queries. In: Proceedings of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 2014","DOI":"10.1109\/CNS.2014.6997505"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. In: Proceedings of the 1st ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC 2010), Genova, Italy, June 2010","DOI":"10.1109\/ICDCSW.2010.35"},{"issue":"2","key":"1_CR18","first-page":"6:1","volume":"6","author":"S Capitani di Vimercati De","year":"2012","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive web applications. ACM Trans. Web (TWEB) 6(2), 6:1\u20136:43 (2012)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"1_CR19","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, September 2007"},{"issue":"2","key":"1_CR20","first-page":"12:1","volume":"35","author":"S De Capitani di Vimercati","year":"2010","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. (TODS) 35(2), 12:1\u201312:46 (2010)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TCC.2013.18","volume":"1","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE Trans. Cloud Comput. (TCC) 1(2), 187\u2013200 (2013)","journal-title":"IEEE Trans. Cloud Comput. (TCC)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, June 2011","DOI":"10.1109\/ICDCS.2011.37"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-642-23822-2_35","volume-title":"Computer Security \u2013 ESORICS 2011","author":"S Capitani di Vimercati De","year":"2011","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency in private data outsourcing. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 648\u2013664. Springer, Heidelberg (2011)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-642-40203-6_35","volume-title":"Computer Security \u2013 ESORICS 2013","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Distributed shuffling for preserving access confidentiality. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 628\u2013645. Springer, Heidelberg (2013)"},{"key":"1_CR25","volume-title":"Secure Cloud Computing","author":"S Capitani di Vimercati De","year":"2014","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia, S., et al. (eds.) Secure Cloud Computing. Springer, New York (2014)"},{"issue":"1","key":"1_CR26","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TIFS.2010.2101062","volume":"6","author":"X Ding","year":"2011","unstructured":"Ding, X., Yang, Y., Deng, R.: Database access pattern protection without full-shuffles. IEEE Trans. Inf. Forensics Secur. (TIFS) 6(1), 189\u2013201 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"issue":"3","key":"1_CR27","first-page":"325","volume":"15","author":"R Donida Labati","year":"2014","unstructured":"Donida Labati, R., Genovese, A., Piuri, V., Scotti, F.: Touchless fingerprint biometrics: a survey on 2D and 3D technologies. J. Internet Technol. 15(3), 325\u2013332 (2014)","journal-title":"J. Internet Technol."},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-21031-0_7","volume-title":"Information Security Practice and Experience","author":"F Zhao","year":"2011","unstructured":"Zhao, F., Nishide, T., Sakurai, K.: Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 83\u201397. Springer, Heidelberg (2011)"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing (STOC 2009), Bethesda, MD, USA, May\u2013June 2009","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, USA, October\u2013November 2006","DOI":"10.1145\/1180405.1180418"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedigs of the 21th ACM SIGMOD International Conference on Management of Data (SIGMOD 2002), Madison, WI, USA, June 2002","DOI":"10.1145\/564691.564717"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proceedings of the IEEE Conference in Europe about Space and Satellite Telecommunications (ESTEL 2012), Rome, Italy, October 2012","DOI":"10.1109\/ESTEL.2012.6400113"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proceedings of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, December 2012","DOI":"10.1109\/ICCSE.2012.32"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Santambrogio, M.: A comprehensive conceptual system-level approach to fault tolerance in cloud computing. In: Proceedings of the 2012 IEEE International Systems Conference (SysCon 2012), Vancouver, Canada, March 2012","DOI":"10.1109\/SysCon.2012.6189503"},{"issue":"2","key":"1_CR35","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JSYST.2012.2221934","volume":"7","author":"R Jhawar","year":"2013","unstructured":"Jhawar, R., Piuri, V., Santambrogio, M.: Fault tolerance management in cloud computing: a system-level perspective. IEEE Syst. J. 7(2), 288\u2013297 (2013)","journal-title":"IEEE Syst. J."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA, October\u2013November 2007","DOI":"10.1145\/1315245.1315317"},{"key":"1_CR37","series-title":"Series in Security","doi-asserted-by":"crossref","DOI":"10.1201\/b18789","volume-title":"Touchless Fingerprint Biometrics","author":"RD Labati","year":"2015","unstructured":"Labati, R.D., Piuri, V., Scotti, F.: Touchless Fingerprint Biometrics. Series in Security. CRC Press, Hoboken (2015)"},{"issue":"4","key":"1_CR38","doi-asserted-by":"publisher","first-page":"32:1","DOI":"10.1145\/1880022.1880026","volume":"13","author":"F Li","year":"2010","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32:1\u201332:35 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 24th ACM SIGMOD International Conference on Management of Data (SIGMOD 2005), Baltimore, MD, USA, June 2005","DOI":"10.1145\/1066157.1066204"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Popa, R., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processin. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP 2011), Cascais, Portugal, October 2011","DOI":"10.1145\/2043556.2043566"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Raykova, M., Zhao, H., Bellovin, S.: Privacy enhanced access control for outsourced data sharing. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), Kralendijk, Bonaire, February\u2013March 2012","DOI":"10.1007\/978-3-642-32946-3_17"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: Proceedings of the 12th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), Ottawa, Canada, May 2012","DOI":"10.1109\/CCGrid.2012.92"},{"key":"1_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-319-06320-1_4","volume-title":"Information Security Practice and Experience","author":"P Samarati","year":"2014","unstructured":"Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28\u201341. Springer, Heidelberg (2014)"},{"key":"1_CR44","volume-title":"Encyclopedia on Cloud Computing","author":"P Samarati","year":"2016","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Cloud security: issues and concerns. In: Murugesan, S., Bojanova, I. (eds.) Encyclopedia on Cloud Computing. Wiley, New York (2016)"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 2013","DOI":"10.1145\/2508859.2516660"},{"key":"1_CR46","unstructured":"Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB 2006), Seoul, Korea, September 2006"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proceedings of the 17th Conference on Information and Knowledge Management (CIKM 2008), Napa Valley, CA, USA, October 2008","DOI":"10.1145\/1458082.1458196"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th IACR International Conference on Practice and Theory of Public Key Cryptography (PKI 2011), Taormina, Italy, March 2011","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), Raleigh, NC, USA, October 2012","DOI":"10.1145\/2382196.2382229"},{"key":"1_CR50","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, September 2007"},{"key":"1_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-642-23822-2_29","volume-title":"Computer Security \u2013 ESORICS 2011","author":"K Yang","year":"2011","unstructured":"Yang, K., Zhang, J., Zhang, W., Qiao, D.: A light-weight solution to preservation of access pattern privacy in un-trusted clouds. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 528\u2013547. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:49:55Z","timestamp":1559332195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}