FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more robust and fault-tolerant wireless sensor network (WSN), such architecture also poses a number of security challenges espe...
Saved in:
Published in | IEEE transactions on parallel and distributed systems Vol. 22; no. 4; pp. 673 - 686 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.04.2011
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1045-9219 1558-2183 |
DOI | 10.1109/TPDS.2010.130 |
Cover
Abstract | Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more robust and fault-tolerant wireless sensor network (WSN), such architecture also poses a number of security challenges especially when applied in mission-critical applications such as battlefield and e-healthcare. First, as sensor data are stored and maintained by individual sensors and unattended sensors are easily subject to strong attacks such as physical compromise, it is significantly harder to ensure data security. Second, in many mission-critical applications, fine-grained data access control is a must as illegal access to the sensitive data may cause disastrous results and/or be prohibited by the law. Last but not least, sensor nodes usually are resource-constrained, which limits the direct adoption of expensive cryptographic primitives. To address the above challenges, we propose, in this paper, a distributed data access control scheme that is able to enforce fine-grained access control over sensor data and is resilient against strong attacks such as sensor compromise and user colluding. The proposed scheme exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for WSNs with respect to both performance and security requirements. The feasibility of the scheme is demonstrated by experiments on real sensor platforms. To our best knowledge, this paper is the first to realize distributed fine-grained data access control for WSNs. |
---|---|
AbstractList | Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed architecture enjoys a more robust and fault-tolerant wireless sensor network (WSN), such architecture also poses a number of security challenges especially when applied in mission-critical applications such as battlefield and e-healthcare. First, as sensor data are stored and maintained by individual sensors and unattended sensors are easily subject to strong attacks such as physical compromise, it is significantly harder to ensure data security. Second, in many mission-critical applications, fine-grained data access control is a must as illegal access to the sensitive data may cause disastrous results and/or be prohibited by the law. Last but not least, sensor nodes usually are resource-constrained, which limits the direct adoption of expensive cryptographic primitives. To address the above challenges, we propose, in this paper, a distributed data access control scheme that is able to enforce fine-grained access control over sensor data and is resilient against strong attacks such as sensor compromise and user colluding. The proposed scheme exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for WSNs with respect to both performance and security requirements. The feasibility of the scheme is demonstrated by experiments on real sensor platforms. To our best knowledge, this paper is the first to realize distributed fine-grained data access control for WSNs. |
Author | Shucheng Yu Kui Ren Wenjing Lou |
Author_xml | – sequence: 1 givenname: Shucheng surname: Yu fullname: Yu, Shucheng – sequence: 2 givenname: Kui surname: Ren fullname: Ren, Kui – sequence: 3 givenname: Wenjing surname: Lou fullname: Lou, Wenjing |
BookMark | eNp1kElLAzEUgAepYF2OnrwMXjxNzd7EW2m1CqKCFY8hzbxAdDrRJIP4752h4qHg6S18b-E7LEZtaKEoTjGaYIzU5epp8TwhaCgp2ivGmHNZESzpqM8R45UiWB0Uhym9IYQZR2xcvNwsZvOrchW-TKzLG99CtYymD3W58ClHv-7ykJtsypm1kFI5D22OoSl9W776CM3Qe4Y2hVg-QP4K8T0dF_vONAlOfuNRf-d6Nb-t7h-Xd_PZfWUpFrmaCq6mbKrWjsIUo1ookBgJKh1n1FmjuLTgaosdtYSvDXPCGVwLbkRN2NrQo-Jiu_cjhs8OUtYbnyw0jWkhdElLwRhWSKqePN8h30IX2_45LTlDhBPCeqjaQjaGlCI4_RH9xsRvjZEeFOtBsR4U615xz9Md3vpssh8EGd_8O3W2nfIA8HeBM0WEpPQH_eeI1Q |
CODEN | ITDSEO |
CitedBy_id | crossref_primary_10_1007_s12083_017_0581_5 crossref_primary_10_1109_TMC_2013_45 crossref_primary_10_32604_iasc_2021_012806 crossref_primary_10_1016_j_dcan_2017_04_003 crossref_primary_10_1109_TSC_2016_2633260 crossref_primary_10_1016_j_future_2016_12_036 crossref_primary_10_1016_j_sysarc_2015_03_002 crossref_primary_10_1109_ACCESS_2017_2727054 crossref_primary_10_1016_j_comcom_2021_01_023 crossref_primary_10_1007_s11276_017_1597_8 crossref_primary_10_4304_jnw_7_3_524_531 crossref_primary_10_1016_j_adhoc_2013_03_013 crossref_primary_10_1007_s10207_014_0272_7 crossref_primary_10_1016_j_jisa_2020_102503 crossref_primary_10_1007_s11277_014_1767_2 crossref_primary_10_1109_TWC_2014_2347311 crossref_primary_10_1002_sec_1594 crossref_primary_10_1007_s10586_017_0863_y crossref_primary_10_1007_s11277_013_1482_4 crossref_primary_10_3390_jsan3020150 crossref_primary_10_1016_j_comcom_2019_10_005 crossref_primary_10_1080_19361610_2019_1669987 crossref_primary_10_1109_ACCESS_2017_2694044 crossref_primary_10_1109_TC_2013_83 crossref_primary_10_1109_TSC_2014_1 crossref_primary_10_1109_TSG_2011_2140343 crossref_primary_10_1186_s40064_016_1765_9 crossref_primary_10_1016_j_jnca_2016_08_006 crossref_primary_10_1016_j_adhoc_2018_07_001 crossref_primary_10_1016_j_future_2017_03_001 crossref_primary_10_1109_TPDS_2012_50 crossref_primary_10_18267_j_aip_74 crossref_primary_10_1109_JIOT_2022_3154039 crossref_primary_10_1109_TR_2015_2429271 crossref_primary_10_1016_j_ins_2016_05_008 crossref_primary_10_1109_TC_2017_2693265 crossref_primary_10_1002_sec_1140 crossref_primary_10_1109_ACCESS_2019_2961413 crossref_primary_10_1145_2487268_2487271 crossref_primary_10_1049_iet_ifs_2012_0271 crossref_primary_10_1016_j_comnet_2018_03_012 crossref_primary_10_1109_JIOT_2018_2878658 crossref_primary_10_1155_2014_259798 crossref_primary_10_1007_s10207_020_00526_3 crossref_primary_10_1109_JBHI_2015_2510403 crossref_primary_10_1109_TII_2018_2824815 crossref_primary_10_1002_cpe_7681 crossref_primary_10_1007_s11042_017_4804_9 crossref_primary_10_1109_TPDS_2012_328 crossref_primary_10_1109_ACCESS_2023_3279492 crossref_primary_10_3390_electronics12051145 crossref_primary_10_1007_s11280_017_0462_0 crossref_primary_10_1109_MWC_2013_6590046 crossref_primary_10_3390_s141222619 crossref_primary_10_1016_j_adhoc_2017_11_006 crossref_primary_10_1109_ACCESS_2021_3066212 crossref_primary_10_1007_s11128_024_04538_z crossref_primary_10_1186_s13638_019_1469_2 crossref_primary_10_1109_TDSC_2020_2987903 crossref_primary_10_4018_IJISP_2019100102 crossref_primary_10_1007_s10586_024_04546_9 crossref_primary_10_1016_j_comcom_2016_03_007 crossref_primary_10_1016_j_jisa_2020_102692 crossref_primary_10_3390_s23135921 crossref_primary_10_3233_JIFS_189873 crossref_primary_10_3390_electronics12132843 |
Cites_doi | 10.1145/371626.371720 10.1109/ICDCSW.2003.1203642 10.1145/1352533.1352557 10.1109/MCOM.2002.1024422 10.1145/1460877.1460900 10.1109/SECPRI.2003.1199337 10.1109/MOBIQUITOUS.2005.25 10.1145/1387663.1387669 10.1016/j.adhoc.2009.04.002 10.1007/3-540-48329-2_40 10.1007/3-540-44647-8_3 10.1109/SAHCN.2005.1556859 10.1007/11776178_19 10.1109/JPROC.2003.814918 10.1109/SP.2007.11 10.1007/11535218_16 10.1145/345910.345953 10.1016/j.adhoc.2004.04.003 10.1145/1180405.1180418 10.1145/1455770.1455823 10.1109/PERCOM.2008.31 10.1145/1653662.1653664 10.1109/INFCOM.2009.5062007 10.1109/TDSC.2008.23 10.1007/11426639_27 10.1109/ICC.2005.1494953 10.1109/ICDCS.2008.77 10.1145/1182807.1182827 10.1109/SAHCN.2007.4292834 10.1109/INFOCOM.2006.303 10.1109/INFCOM.2009.5062006 10.1016/j.pmcj.2007.06.002 10.1109/49.790485 10.1145/570738.570750 10.1007/11573036_4 10.1145/958491.958501 10.1109/ICDCSW.2002.1030829 10.1109/TMC.2008.168 10.1007/978-3-540-28628-8_31 10.1109/MSP.2004.1296538 10.1109/MPRV.2002.993145 10.1016/j.adhoc.2006.05.004 10.1109/INFCOM.2004.1354666 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2011 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Apr 2011 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TPDS.2010.130 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science Architecture |
EISSN | 1558-2183 |
EndPage | 686 |
ExternalDocumentID | 2278340911 10_1109_TPDS_2010_130 5492683 |
Genre | orig-research |
GroupedDBID | --Z -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD HZ~ H~9 ICLAB IEDLZ IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB TN5 TWZ UHB VH1 AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D RIG F28 FR3 |
ID | FETCH-LOGICAL-c316t-76597479bf3e710d69e810638f543fca958cefdc1f3c25ba4f6fa1d65a6d24ba3 |
IEDL.DBID | RIE |
ISSN | 1045-9219 |
IngestDate | Sun Sep 28 00:06:36 EDT 2025 Mon Jun 30 07:06:54 EDT 2025 Wed Oct 01 06:41:54 EDT 2025 Thu Apr 24 22:58:14 EDT 2025 Wed Aug 27 02:52:31 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-76597479bf3e710d69e810638f543fca958cefdc1f3c25ba4f6fa1d65a6d24ba3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
PQID | 854025224 |
PQPubID | 85437 |
PageCount | 14 |
ParticipantIDs | proquest_journals_854025224 crossref_primary_10_1109_TPDS_2010_130 crossref_citationtrail_10_1109_TPDS_2010_130 proquest_miscellaneous_864419089 ieee_primary_5492683 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2011-04-01 |
PublicationDateYYYYMMDD | 2011-04-01 |
PublicationDate_xml | – month: 04 year: 2011 text: 2011-04-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on parallel and distributed systems |
PublicationTitleAbbrev | TPDS |
PublicationYear | 2011 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref11 (ref48) 2000 ref10 ref17 (ref49) 2010 ref16 ref19 ref18 Cheung (ref29) 2007 (ref52) 2009 ref46 ref45 ref42 ref41 Camtepe (ref44) 2005 ref43 ref8 ref7 ref4 ref3 ref6 ref5 ref40 (ref51) 2009 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 (ref50) 2010 ref39 ref38 (ref47) 1999 Mitra (ref9) ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 |
References_xml | – volume-title: TinyECC Library year: 2010 ident: ref50 – ident: ref5 doi: 10.1145/371626.371720 – ident: ref17 doi: 10.1109/ICDCSW.2003.1203642 – year: 1999 ident: ref47 article-title: Recommended Elliptic Curves for Federal Government Use – ident: ref25 doi: 10.1145/1352533.1352557 – ident: ref3 doi: 10.1109/MCOM.2002.1024422 – ident: ref35 doi: 10.1145/1460877.1460900 – ident: ref19 doi: 10.1109/SECPRI.2003.1199337 – volume-title: PBC Library year: 2010 ident: ref49 – volume-title: Cryptology ePrint Archive Report 2007/161 year: 2007 ident: ref29 article-title: Collusion-Resistant Group Key Management Using Attribute-Based Encryption – volume-title: Technical Report TR-05-07, Rensselaer Polytechnic Inst., Computer Science Dept. year: 2005 ident: ref44 article-title: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey – ident: ref43 doi: 10.1109/MOBIQUITOUS.2005.25 – ident: ref22 doi: 10.1145/1387663.1387669 – ident: ref21 doi: 10.1016/j.adhoc.2009.04.002 – ident: ref30 doi: 10.1007/3-540-48329-2_40 – ident: ref31 doi: 10.1007/3-540-44647-8_3 – volume-title: Proc. Ann IEEE/ACM Int’l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous ’05) ident: ref9 article-title: High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage – ident: ref8 doi: 10.1109/SAHCN.2005.1556859 – ident: ref23 doi: 10.1007/11776178_19 – ident: ref4 doi: 10.1109/JPROC.2003.814918 – ident: ref34 doi: 10.1109/SP.2007.11 – ident: ref28 doi: 10.1007/11535218_16 – volume-title: TelosB mote platform year: 2009 ident: ref52 – ident: ref32 doi: 10.1145/345910.345953 – ident: ref2 doi: 10.1016/j.adhoc.2004.04.003 – ident: ref33 doi: 10.1145/1180405.1180418 – ident: ref38 doi: 10.1145/1455770.1455823 – volume-title: Imote2: High-performance wireless sensor network node year: 2009 ident: ref51 – ident: ref15 doi: 10.1109/PERCOM.2008.31 – ident: ref27 doi: 10.1145/1653662.1653664 – ident: ref1 doi: 10.1109/INFCOM.2009.5062007 – ident: ref42 doi: 10.1109/TDSC.2008.23 – ident: ref39 doi: 10.1007/11426639_27 – ident: ref41 doi: 10.1109/ICC.2005.1494953 – volume-title: Certicom Research, "Standards for Efficient Cryptography C SEC 2: Recommended Elliptic Curve Domain Parameters year: 2000 ident: ref48 – ident: ref24 doi: 10.1109/ICDCS.2008.77 – ident: ref10 doi: 10.1145/1182807.1182827 – ident: ref46 doi: 10.1109/SAHCN.2007.4292834 – ident: ref45 doi: 10.1109/INFOCOM.2006.303 – ident: ref16 doi: 10.1109/INFCOM.2009.5062006 – ident: ref26 doi: 10.1016/j.pmcj.2007.06.002 – ident: ref37 doi: 10.1109/49.790485 – ident: ref12 doi: 10.1145/570738.570750 – ident: ref11 doi: 10.1007/11573036_4 – ident: ref13 doi: 10.1145/958491.958501 – ident: ref40 doi: 10.1109/ICDCSW.2002.1030829 – ident: ref20 doi: 10.1109/TMC.2008.168 – ident: ref36 doi: 10.1007/978-3-540-28628-8_31 – ident: ref7 doi: 10.1109/MSP.2004.1296538 – ident: ref6 doi: 10.1109/MPRV.2002.993145 – ident: ref14 doi: 10.1016/j.adhoc.2006.05.004 – ident: ref18 doi: 10.1109/INFCOM.2004.1354666 |
SSID | ssj0014504 |
Score | 2.3678832 |
Snippet | Distributed sensor data storage and retrieval have gained increasing popularity in recent years for supporting various applications. While distributed... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 673 |
SubjectTerms | Access control Architecture attribute-based encryption Cryptography Data access control Data security distributed storage Fault tolerance Information retrieval Information storage Memory Mission critical systems Network security Networks Robustness Security Sensor phenomena and characterization Sensors Wireless communication wireless sensor network Wireless sensor networks |
Title | FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks |
URI | https://ieeexplore.ieee.org/document/5492683 https://www.proquest.com/docview/854025224 https://www.proquest.com/docview/864419089 |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2183 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014504 issn: 1045-9219 databaseCode: RIE dateStart: 19900101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7Ukx58VbG-yEE8ubW7m012vZXWKkKLYAveljxBLFvR7cVfbya7XcUHyF7CZgiBySQzmS_zAZwZi0VUGAuct2EDKpXbB7MkDmzXSi5pGAqOj5NHY3Y7pXePyeMKXDRvYYwxHnxmOtj0uXw9Vwu8KrvEamIsjVdhlfOseqvVZAxo4qkCXXSRBJkzw896mpeT-8FDBeIKEez85fzxhCo_dmF_tAy3YLScVIUoee4sStlR79_qNf531tuwWfuYpFctih1YMcUubC35G0htzruw8aUYYQumw0Gvf0UmHkdLhq4juEH-CKPJAKvrIjEWtkUpSM_TLJJ-hXMnTwVBFO0M_z24uHj-SsYVvPxtz417PenfBjXpQqDikJUBZz7EyKSNjfM-NMtMGqJfYxMaWyWyJFXGahXaWEWJFNQyK0LNEsF0RKWI92GtmBfmAEgqrdE60kpHXcqZyEzXSVMec-2-iLfhYqmKXNUVyZEYY5b7yKSb5ai5HDWHWbc2nDfiL1Upjr8EW6iFRqhWQBuOlnrOa0N9y1PnsUbOB6VtIE2vszBMm4jCzBdOBF1GTI8e_j7uEaxXF80I5zmGtfJ1YU6cp1LKU79EPwC0X-VD |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dT9swED_x8TD2AKMwrcCGHxBPTWkS20n2VrWUAm01iSLxFvlTmobSCdKX_fXzOWlWwZBQXqz4ZFk6n_073893AGfGYhIVzgOHNmxApXL7YMbiwPasTCQNQ5Hg4-TpjI_v6c0De9iATvMWxhjjyWemi00fy9cLtcSrsgvMJsbTeBO2mfMqkuq1VhMzoMwXC3T-BQsyZ4j_MmpezH8M7yoaV4h057UTyJdUebUP-8NltAfT1bQqTsmv7rKUXfXnRcbG9877E-zWKJP0q2WxDxumaMHeqoIDqQ26BR_X0hEewP1o2B98J3PPpCUj1xFcYQUJo8kQ8-tiaSxsi1KQvi-0SAYV0538LAjyaB_x353zjBdPZFYRzJ8P3biX88E4qMsuBCoOeRkk3DsZmbSxcfhD88ykISIby2hslchYqozVKrSxipgU1HIrQs2Z4DqiUsSfYatYFOYLkFRao3WklY56NOEiMz0nTZM40e6LkjZ0VqrIVZ2THEtjPObeN-llOWouR81h3K0N54347yoZx1uCB6iFRqhWQBuOV3rOa1N9zlOHWSOHQmkbSNPrbAwDJ6Iwi6UTQdCIAdKj_497Ch_G8-kkn1zPbo9hp7p2RnLPCWyVT0vz1eGWUn7zy_Uv5aLolA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=FDAC%3A+Toward+Fine-Grained+Distributed+Data+Access+Control+in+Wireless+Sensor+Networks&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Yu%2C+Shucheng&rft.au=Ren%2C+Kui&rft.au=Lou%2C+Wenjing&rft.date=2011-04-01&rft.issn=1045-9219&rft.volume=22&rft.issue=4&rft.spage=673&rft.epage=686&rft_id=info:doi/10.1109%2FTPDS.2010.130&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon |