{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T18:16:41Z","timestamp":1760552201613,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819604364"},{"type":"electronic","value":"9789819604371"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0437-1_4","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T16:56:24Z","timestamp":1732640184000},"page":"48-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Multi-tenant Architecture for Customer Experience Survey Software"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1580-9032","authenticated-orcid":false,"given":"Quoc-Dung","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Nam","family":"Pham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Trang-Nhung","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tam-Nhu","family":"Phan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"4_CR1","unstructured":"Deloitte: 2021 Global Marketing Trends. (2021). [Online]. Available: https:\/\/www2.deloitte.com\/xe\/en\/pages\/strategy-operations\/articles\/2021-global-marketing-trends.html"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"4_CR3","unstructured":"AWS: SaaS Tenant Isolation Strategies: Isolating Resources in a Multi-Tenant Environment. (2020). [Online]. Available: https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/saas-tenant-isolation-strategies\/saas-tenant-isolation-strategies.html"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bezemer, C.-P., Zaidman, A.: Multi-tenant SaaS applications: maintenance dream or nightmare? In: Proceedings of the Joint ERCIM Workshop on Software Evolution, pp. 88\u201392 (2010)","DOI":"10.1145\/1862372.1862393"},{"key":"4_CR5","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O'Reilly Media (2009)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Aulbach, S., Grust, T., Jacobs, D., Kemper, A., Rittinger, J.: Multi-tenant databases for software as a service: schema-mapping techniques. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 1195\u20131206 (2008)","DOI":"10.1145\/1376616.1376736"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Mietzner, R., Unger, T., Titze, R., Leymann, F.: Combining different multi-tenancy patterns in service-oriented applications. In: 2009 IEEE International Enterprise Distributed Object Computing Conference, pp. 131\u2013140 (2009)","DOI":"10.1109\/EDOC.2009.13"},{"issue":"12","key":"4_CR8","first-page":"46","volume":"81","author":"FF Reichheld","year":"2003","unstructured":"Reichheld, F.F.: The one number you need to grow. Harv. Bus. Rev. 81(12), 46\u201355 (2003)","journal-title":"Harv. Bus. Rev."},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/002224299606000403","volume":"60","author":"C Fornell","year":"1996","unstructured":"Fornell, C., Johnson, M.D., Anderson, E.W., Cha, J., Bryant, B.E.: The American customer satisfaction index: nature, purpose, and findings. J. Mark. 60(4), 7\u201318 (1996)","journal-title":"J. Mark."},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165\u20131188 (2012)","journal-title":"MIS Q."},{"key":"4_CR11","unstructured":"Provos, N., Mazi\u00e8res, D.: A future-adaptable password scheme. In Proceedings of the Annual Conference on USENIX Annual Technical Conference, USENIX Association, pp. 81\u201391 (1999)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J.: JSON Web Token (JWT). IETF. RFC 7519 (2015)","DOI":"10.17487\/RFC7519"},{"key":"4_CR13","unstructured":"Chong, F., Carraro, G., Wolter, R.: Multi-Tenant Data Architecture. Microsoft Corporation, pp. 14\u201330 (2006)"},{"key":"4_CR14","unstructured":"National Institute of Standards and Technology: Security and privacy controls for federal information systems and organizations. NIST Special Publication, 800-53, Revision 4 (2014)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Priovolos, T., Maroulis, S., Kalogeraki, V.: ESCAPe: Elastic caching for big data systems. In: 2019 38th Symposium on Reliable Distributed Systems (SRDS) (2019)","DOI":"10.1109\/SRDS47363.2019.00020"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Chi, X., Liu, B., Niu, Q., Wu, Q.: Web load balance and cache optimization design based nginx under high-concurrency environment. In: 2012 Third International Conference on Digital Manufacturing & Automation, pp. 1029\u20131032 (2012)","DOI":"10.1109\/ICDMA.2012.241"},{"key":"4_CR17","volume-title":"Angular: Up and Running: Learning Angular, Step by Step","author":"S Seshadri","year":"2018","unstructured":"Seshadri, S.: Angular: Up and Running: Learning Angular, Step by Step. O\u2019Reilly Media Inc (2018)"},{"key":"4_CR18","unstructured":"Osmani, A.: Learning JavaScript Design Patterns. O'Reilly Media (2023)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Buyya, R., Broberg, J., Goscinski, A. (eds.): Cloud Computing: Principles and Paradigms. John Wiley & Sons (2011)","DOI":"10.1002\/9780470940105"},{"key":"4_CR20","unstructured":"Karwin, B.: SQL antipatterns: Avoiding the Programming Pitfalls of Database Development. Pragmatic Bookshelf (2017)"},{"issue":"2","key":"4_CR21","first-page":"104","volume":"2","author":"S Maesaroh","year":"2022","unstructured":"Maesaroh, S., Gunawan, H., Lestari, A., Tsaurie, M.S.A., Fauji, M.: Query optimization in MySQL database using index. Int. J. Cyber IT Serv. Manag. 2(2), 104\u2013110 (2022)","journal-title":"Int. J. Cyber IT Serv. Manag."}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0437-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:02:48Z","timestamp":1732640568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0437-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819604364","9789819604371"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0437-1_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Binh Duong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}