Secure authentication mechanisms for the management interface in cloud computing environments
Autor(a) principal: | |
---|---|
Data de Publicação: | 2013 |
Tipo de documento: | Dissertação |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10400.6/3775 |
Resumo: | For a handful of years, cloud computing has been a hot catchphrase. The industry has massively adopted it and the academia is focusing on improving the technology, which has been evolving at a quick pace. The cloud computing paradigm consists in adopting solutions provisioned by some cloud providers that are hosted on data centers. Customers are therefore tied to those third-party entities, since they becomes involved in their businesses for being responsible for the Information Technologies (IT) infrastructures outsourced to the clouds. This implies that customers have to totally or partially migrate their on-premises infrastructures to off-premises clouds, including, but not limited to, email, web applications, storage databases, and even complete servers that become wrapped in services accessed via the Internet. Clouds deliver scalable and elastic networking, storage, and processing capabilities in an on-demand and self-provisioned manner adopting the pay-as-you-go business model. This bene ts the customers signi cantly, allowing them to promote their businesses without worrying about inherent IT infrastructures. The services supplied by clouds are basically encapsulated by one of the three main service delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). They are the building blocks for unfolding Anything-as-a-Service (XaaS) solutions speci cally customized to customer requirements. IaaS mixes novel virtualization techniques with current technologies that allow to run Operating Systems (OSes) or even build entire virtual data centers. PaaS allows to develop applications in a consistent manner via the cloud platforms to run remotely, while SaaS enables enjoying pre-built software with little control over the application ow. These models can run on public or private clouds, or on a hybrid version of the two. Adopting the public model means accessing the subscribed services through the Internet from anywhere in the globe. IaaS clouds usually have some management interface to control Virtual Machines (VMs) and to arrange a virtual data center, while VMs are accessed via standard remote connection protocols. The authentication to those interface is, therefore, of utmost importance, mostly because they are exposed to Internet dangers, contrarily to traditional management tools that are deeply within the trusted perimeter of a company on conventional networks. This dissertation rst identi es such problems by reviewing authentication approaches and pointing out their advantages and weaknesses. For example, a single compromised cloud account constitutes an inherently more dangerous threat when compared to traditional website accounts, because an attacker gains control over VMs and potentially over security-related con gurations as well. This can result in data and money losses for both customers and providers, since the malicious attacker can terminate VM instances running crucial business applications. The problem also resides on the fact that the security of authentication by means of a static password has been decreasing over time, and it is now a method considered unsafe. Data breaches in the past have provided key understanding over user password habits, allowing crackers to build huge password lists and devise ef cient cracking algorithms. Current threats that are inherent to the Internet technologies aggravate this problem further. The cyberspace is increasingly getting more violent with cyberwarfare, cybercriminality, and mass surveillance affecting everyone. For instance, malware writers are focusing on mobile platforms since that is a eld where technology is rapidly evolving, sometimes in an uncontrolled manner, and that users are widely adopting. As a reaction to some of those problems, both the industry and the academia have turned their attention to alternative authentication schemes based on Single Sign-On (SSO) and Multi-Factor Authentication (MFA). SSO is used to alleviate the burden associated with the management of multiple credentials for cloud applications, while MFA adds authentication layers for additional security, in exchange for a drop in usability and an increase to the cost. Such new approaches implement authentication schemes resorting to both public-key and symmetric cryptography mechanisms and to new technologies, namely associated to mobile. Several contributions on this research line can be found in the recent literature. Nonetheless, they still do not pay particular attention to the underlying infrastructure and threats. The scope of this dissertation is con ned to the topics of cloud computing and authentication, studying how that new computing model works, with particular emphasis on the security, and reviewing authentication methods orthogonally to cloud computing and to the security perspective. Because cloud management interfaces are inherently more riskier for being exposed in the Internet and starting from the previously mentioned study, this dissertation proposes a new security model, suitable to deploy on the frontend edges of cloud networks, mediating the access of users to the subscribed services, while patching security threats inherited from the Internet. It is envisaged as a centralized point for enforcing several types of security controls and its main advantage derives from the fact that it resorts to the usage of technology speci c to cloud computing, namely virtualization, from which it inherits robustness and elasticity. A prototype showing how the model can be deployed is also described in this dissertation. It uses the Portuguese identity card to achieve strong and mutual authentication by means of public-key certi cates, in a way that is simple and transparent. to the user. The prototype demonstrates the functionality of the proposed model and how it can be deployed using cloud computing technology, so as to conceal the internal interface from outside threats. Recommendations for implementing authentication methods are also described, owing the discussion from classical authentication to trendy authentication approaches. |
id |
RCAP_83c26431fe05d9ffbeff04ec6a006740 |
---|---|
oai_identifier_str |
oai:ubibliorum.ubi.pt:10400.6/3775 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Secure authentication mechanisms for the management interface in cloud computing environmentsComputação em nuvemComputação em nuvem - SegurançaComputação em nuvem - AutenticaçãoComputação em nuvem - Cliente-servidorMáquina virtual - Interface de gestãoCriptografia - Chave públicaDomínio/Área Científica:Engenharia e TecnologiaFor a handful of years, cloud computing has been a hot catchphrase. The industry has massively adopted it and the academia is focusing on improving the technology, which has been evolving at a quick pace. The cloud computing paradigm consists in adopting solutions provisioned by some cloud providers that are hosted on data centers. Customers are therefore tied to those third-party entities, since they becomes involved in their businesses for being responsible for the Information Technologies (IT) infrastructures outsourced to the clouds. This implies that customers have to totally or partially migrate their on-premises infrastructures to off-premises clouds, including, but not limited to, email, web applications, storage databases, and even complete servers that become wrapped in services accessed via the Internet. Clouds deliver scalable and elastic networking, storage, and processing capabilities in an on-demand and self-provisioned manner adopting the pay-as-you-go business model. This bene ts the customers signi cantly, allowing them to promote their businesses without worrying about inherent IT infrastructures. The services supplied by clouds are basically encapsulated by one of the three main service delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). They are the building blocks for unfolding Anything-as-a-Service (XaaS) solutions speci cally customized to customer requirements. IaaS mixes novel virtualization techniques with current technologies that allow to run Operating Systems (OSes) or even build entire virtual data centers. PaaS allows to develop applications in a consistent manner via the cloud platforms to run remotely, while SaaS enables enjoying pre-built software with little control over the application ow. These models can run on public or private clouds, or on a hybrid version of the two. Adopting the public model means accessing the subscribed services through the Internet from anywhere in the globe. IaaS clouds usually have some management interface to control Virtual Machines (VMs) and to arrange a virtual data center, while VMs are accessed via standard remote connection protocols. The authentication to those interface is, therefore, of utmost importance, mostly because they are exposed to Internet dangers, contrarily to traditional management tools that are deeply within the trusted perimeter of a company on conventional networks. This dissertation rst identi es such problems by reviewing authentication approaches and pointing out their advantages and weaknesses. For example, a single compromised cloud account constitutes an inherently more dangerous threat when compared to traditional website accounts, because an attacker gains control over VMs and potentially over security-related con gurations as well. This can result in data and money losses for both customers and providers, since the malicious attacker can terminate VM instances running crucial business applications. The problem also resides on the fact that the security of authentication by means of a static password has been decreasing over time, and it is now a method considered unsafe. Data breaches in the past have provided key understanding over user password habits, allowing crackers to build huge password lists and devise ef cient cracking algorithms. Current threats that are inherent to the Internet technologies aggravate this problem further. The cyberspace is increasingly getting more violent with cyberwarfare, cybercriminality, and mass surveillance affecting everyone. For instance, malware writers are focusing on mobile platforms since that is a eld where technology is rapidly evolving, sometimes in an uncontrolled manner, and that users are widely adopting. As a reaction to some of those problems, both the industry and the academia have turned their attention to alternative authentication schemes based on Single Sign-On (SSO) and Multi-Factor Authentication (MFA). SSO is used to alleviate the burden associated with the management of multiple credentials for cloud applications, while MFA adds authentication layers for additional security, in exchange for a drop in usability and an increase to the cost. Such new approaches implement authentication schemes resorting to both public-key and symmetric cryptography mechanisms and to new technologies, namely associated to mobile. Several contributions on this research line can be found in the recent literature. Nonetheless, they still do not pay particular attention to the underlying infrastructure and threats. The scope of this dissertation is con ned to the topics of cloud computing and authentication, studying how that new computing model works, with particular emphasis on the security, and reviewing authentication methods orthogonally to cloud computing and to the security perspective. Because cloud management interfaces are inherently more riskier for being exposed in the Internet and starting from the previously mentioned study, this dissertation proposes a new security model, suitable to deploy on the frontend edges of cloud networks, mediating the access of users to the subscribed services, while patching security threats inherited from the Internet. It is envisaged as a centralized point for enforcing several types of security controls and its main advantage derives from the fact that it resorts to the usage of technology speci c to cloud computing, namely virtualization, from which it inherits robustness and elasticity. A prototype showing how the model can be deployed is also described in this dissertation. It uses the Portuguese identity card to achieve strong and mutual authentication by means of public-key certi cates, in a way that is simple and transparent. to the user. The prototype demonstrates the functionality of the proposed model and how it can be deployed using cloud computing technology, so as to conceal the internal interface from outside threats. Recommendations for implementing authentication methods are also described, owing the discussion from classical authentication to trendy authentication approaches.Nos últimos anos, a expressão computação na nuvem tem sido tema de discussão. A indústria adotou esta tecnologia massivamente enquanto que a academia se está a focar em melhorá-la, e a qual tem vindo a evoluir rapidamente. O paradigma da computação na nuvem consiste em adotar soluções de fornecedores de computação na nuvem, que são hospedadas nalgum centro de dados. Os clientes tornam-se, portanto, dependentes dessas (terceiras) entidades, já que estas ficam envolvidas nos seus negócios ao serem responsáveis pelas tecnologias de informação hospedadas em uma ou mais nuvens. Isto implica que os clientes migrem as suas infraestruturas de tecnologias de informação e serviços locais para essas nuvens, localizadas fora das suas instalações. Os serviços e infraestruturas que podem ser deslocalizados incluem, mas não estão limitados a, serviços de e-mail, aplicações web, bases de dados, ou servidores completos que passam a ser encapsulados em serviços acedidos via Internet. Como vantagens, as nuvens oferecem capacidades de armazenamento, processamento e rede de uma forma escalável e elástica, à medida que o cliente quer e de uma maneira automática, ao seguir o modelo de negócio de pagamento por utilização. Isto beneficia bastante os clientes, permitindo-lhes que se foquem nos seus negócios, abstraindo-os das infraestruturas e problemas relacionados com tecnologias de informação. Os serviços fornecidos pelas nuvens encapsulam-se normalmente num dos três principais modelos de fornecimento seguintes: Infraestrutura-como-um-Serviço (laaS), Plataforma-como-um- Serviço (PaaS), e Software-como-um-Serviço (SaaS). Estes são os alicerces para soluções de Qualquer-coisa-como-um-Serviço (XaaS) que podem ser customizadas consoante os requisitos dos clientes. laaS mistura técnicas novas de virtualização com tecnologias atuais que permite correr sistemas operativos ou mesmo construir centros de dados virtuais. PaaS permite desenvolver aplicações de uma forma consistente através das plataformas da nuvem para correrem sobre elas, enquanto que o SaaS permite usufruir de software previamente desenvolvido, tendo o cliente pouco controlo sobre o mesmo. Estes modelos podem ser implementados sobre nuvens privadas ou públicas, ou então sobre uma versão híbrida das duas. O modelo público significa que os serviços subscritos são acedidos através da Internet e a partir de qualquer ponto do globo. As nuvens laaS têm tipicamente uma interface de gestão para controlo de Máquinas Virtuais (VMs) e para organizar um centro de dados virtual, enquanto que as VMs são acedidas por protocolos de acesso remoto. A autenticação para estas interfaces de gestão é, portanto, de grande importância. visto que estão expostas aos perigos da Internet, contrariamente às ferramentas tradicionais de gestão que são colocadas dentro do perímetro de confiança de uma empresa em redes convencionais. Esta dissertação identifica em primeiro lugar tais problemas de segurança ao rever as abordagens existentes de autenticação, mostrando as suas vantagens e fraquezas. Por exemplo, uma única conta comprometida constitui um risco muito maior quando comparado a contas tradicionais de páginas web, porque os atacantes ganham controlo sobre as virtuais e potencialmente também sobre configurações de segurança. Isto pode resultar em perdas de dados e de dinheiro para ambos os clientes e os fornecedores de computação na nuvem, dado que um atacante malicioso consegue terminar instâncias de virtuais que possam correr aplicações críticas para o negócio do cliente. o problema também reside no facto de que autenticação por meio de palavra-passe estática tem vindo, ao longo do tempo, a ficar mais degradada, sendo hoje em dia considerada insegura para utilização. As inúmeras fugas de dados do passado forneceram um conhecimento chave para compreender os hábitos dos utilizadores na escolha de palavras-passe, permitindo a atacantes compilar grandes listas de palavras-passe e desenvolver algoritmos eficientes para descobrir palavras-passe. As ameaças inerentes à utilização da Internet para aceder à interface de administração também agravam o problema. O ciberespaço é cada vez mais utilizado de forma abusiva e violenta com a ciberguerra, a cibercriminalidade, e a vigilância em massa afetando todos os utilizadores. Por exemplo, os autores de malware estão a focar-se nas plataformas móveis já que é para elas que a tecnologia evoluiu e as quais os utilizadores utilizam largamente. Como resposta, a indústria e a academia viraram as suas atenções para esquemas de autenticação alternativos baseados em Sistemas de Login Único (SSO) e Autenticação por Múltiplos Fatores (MFA). O SSO vem aliviar o fardo da gestão de múltiplas credenciais para aplicações na nuvem, enquanto que o MFA adiciona camadas adicionais de segurança em troca de uma quebra na usabilidade e um aumento no custo. Estas novas abordagens implementam esquemas de autenticação que recorrem a mecanismos da criptografia assimétrica e simétrica, por exemplo, e às novas tecnologias, sobretudo associadas ao móvel. A literatura contém várias contribuições nesta linha de investigação. No entanto, estas ainda não prestam total importância às infraestruturas inerentes e às ameaças atuais. O âmbito desta dissertação está restrito aos tópicos de computação na nuvem e de autenticação na interface de administração de um cliente, estudando como este novo modelo de computação funciona, particularmente com ênfase na segurança, e revendo métodos de autenticação de forma ortogonal ao modelo de computação na nuvem e à perspetiva da segurança. Dado que as interfaces de gestão da nuvem são inerentemente mais arriscadas por estarem expostas e partindo do estudo inicial, esta dissertação propõe um novo modelo de autenticação, ideal para implementar nas fronteiras das redes de nuvens, e capaz de mediar o acesso de utilizadores aos serviços subscritos enquanto remenda as ameaças de segurança que emancipam da Internet. Este modelo funciona como um ponto central de segurança onde podem ser forçados controlos de segurança de qualquer tipo e a sua maior vantagem provém do facto de recorrer à tecnologia própria da computação na nuvem, nomeadamente virtualização, das quais herda robustez e elasticidade. Um protótipo que mostra como o modelo pode ser implementado é ainda descrito nesta dissertação. Este protótipo usa o cartão de cidadão Português para conseguir autenticação forte e mútua através de certificados de chave pública, de forma simples e transparente para o utilizador. O protótipo demonstra a funcionalidade do modelo proposto e como pode ser implementado utilizado a tecnologia de computação na nuvem, de forma a esconder a interface interna de ameaças externas. Recomendações para implementar métodos de autenticação são também descritos, fluindo a discussão de métodos clássicos para autenticação para abordagens tendenciais de autenticação.Inácio, Pedro Ricardo MoraisuBibliorumSoares, Liliana Filipa Baptista2015-07-24T11:25:45Z20132013-102013-01-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttp://hdl.handle.net/10400.6/3775TID:201289873enginfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-12-15T09:40:18Zoai:ubibliorum.ubi.pt:10400.6/3775Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T00:45:07.947406Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Secure authentication mechanisms for the management interface in cloud computing environments |
title |
Secure authentication mechanisms for the management interface in cloud computing environments |
spellingShingle |
Secure authentication mechanisms for the management interface in cloud computing environments Soares, Liliana Filipa Baptista Computação em nuvem Computação em nuvem - Segurança Computação em nuvem - Autenticação Computação em nuvem - Cliente-servidor Máquina virtual - Interface de gestão Criptografia - Chave pública Domínio/Área Científica:Engenharia e Tecnologia |
title_short |
Secure authentication mechanisms for the management interface in cloud computing environments |
title_full |
Secure authentication mechanisms for the management interface in cloud computing environments |
title_fullStr |
Secure authentication mechanisms for the management interface in cloud computing environments |
title_full_unstemmed |
Secure authentication mechanisms for the management interface in cloud computing environments |
title_sort |
Secure authentication mechanisms for the management interface in cloud computing environments |
author |
Soares, Liliana Filipa Baptista |
author_facet |
Soares, Liliana Filipa Baptista |
author_role |
author |
dc.contributor.none.fl_str_mv |
Inácio, Pedro Ricardo Morais uBibliorum |
dc.contributor.author.fl_str_mv |
Soares, Liliana Filipa Baptista |
dc.subject.por.fl_str_mv |
Computação em nuvem Computação em nuvem - Segurança Computação em nuvem - Autenticação Computação em nuvem - Cliente-servidor Máquina virtual - Interface de gestão Criptografia - Chave pública Domínio/Área Científica:Engenharia e Tecnologia |
topic |
Computação em nuvem Computação em nuvem - Segurança Computação em nuvem - Autenticação Computação em nuvem - Cliente-servidor Máquina virtual - Interface de gestão Criptografia - Chave pública Domínio/Área Científica:Engenharia e Tecnologia |
description |
For a handful of years, cloud computing has been a hot catchphrase. The industry has massively adopted it and the academia is focusing on improving the technology, which has been evolving at a quick pace. The cloud computing paradigm consists in adopting solutions provisioned by some cloud providers that are hosted on data centers. Customers are therefore tied to those third-party entities, since they becomes involved in their businesses for being responsible for the Information Technologies (IT) infrastructures outsourced to the clouds. This implies that customers have to totally or partially migrate their on-premises infrastructures to off-premises clouds, including, but not limited to, email, web applications, storage databases, and even complete servers that become wrapped in services accessed via the Internet. Clouds deliver scalable and elastic networking, storage, and processing capabilities in an on-demand and self-provisioned manner adopting the pay-as-you-go business model. This bene ts the customers signi cantly, allowing them to promote their businesses without worrying about inherent IT infrastructures. The services supplied by clouds are basically encapsulated by one of the three main service delivery models: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). They are the building blocks for unfolding Anything-as-a-Service (XaaS) solutions speci cally customized to customer requirements. IaaS mixes novel virtualization techniques with current technologies that allow to run Operating Systems (OSes) or even build entire virtual data centers. PaaS allows to develop applications in a consistent manner via the cloud platforms to run remotely, while SaaS enables enjoying pre-built software with little control over the application ow. These models can run on public or private clouds, or on a hybrid version of the two. Adopting the public model means accessing the subscribed services through the Internet from anywhere in the globe. IaaS clouds usually have some management interface to control Virtual Machines (VMs) and to arrange a virtual data center, while VMs are accessed via standard remote connection protocols. The authentication to those interface is, therefore, of utmost importance, mostly because they are exposed to Internet dangers, contrarily to traditional management tools that are deeply within the trusted perimeter of a company on conventional networks. This dissertation rst identi es such problems by reviewing authentication approaches and pointing out their advantages and weaknesses. For example, a single compromised cloud account constitutes an inherently more dangerous threat when compared to traditional website accounts, because an attacker gains control over VMs and potentially over security-related con gurations as well. This can result in data and money losses for both customers and providers, since the malicious attacker can terminate VM instances running crucial business applications. The problem also resides on the fact that the security of authentication by means of a static password has been decreasing over time, and it is now a method considered unsafe. Data breaches in the past have provided key understanding over user password habits, allowing crackers to build huge password lists and devise ef cient cracking algorithms. Current threats that are inherent to the Internet technologies aggravate this problem further. The cyberspace is increasingly getting more violent with cyberwarfare, cybercriminality, and mass surveillance affecting everyone. For instance, malware writers are focusing on mobile platforms since that is a eld where technology is rapidly evolving, sometimes in an uncontrolled manner, and that users are widely adopting. As a reaction to some of those problems, both the industry and the academia have turned their attention to alternative authentication schemes based on Single Sign-On (SSO) and Multi-Factor Authentication (MFA). SSO is used to alleviate the burden associated with the management of multiple credentials for cloud applications, while MFA adds authentication layers for additional security, in exchange for a drop in usability and an increase to the cost. Such new approaches implement authentication schemes resorting to both public-key and symmetric cryptography mechanisms and to new technologies, namely associated to mobile. Several contributions on this research line can be found in the recent literature. Nonetheless, they still do not pay particular attention to the underlying infrastructure and threats. The scope of this dissertation is con ned to the topics of cloud computing and authentication, studying how that new computing model works, with particular emphasis on the security, and reviewing authentication methods orthogonally to cloud computing and to the security perspective. Because cloud management interfaces are inherently more riskier for being exposed in the Internet and starting from the previously mentioned study, this dissertation proposes a new security model, suitable to deploy on the frontend edges of cloud networks, mediating the access of users to the subscribed services, while patching security threats inherited from the Internet. It is envisaged as a centralized point for enforcing several types of security controls and its main advantage derives from the fact that it resorts to the usage of technology speci c to cloud computing, namely virtualization, from which it inherits robustness and elasticity. A prototype showing how the model can be deployed is also described in this dissertation. It uses the Portuguese identity card to achieve strong and mutual authentication by means of public-key certi cates, in a way that is simple and transparent. to the user. The prototype demonstrates the functionality of the proposed model and how it can be deployed using cloud computing technology, so as to conceal the internal interface from outside threats. Recommendations for implementing authentication methods are also described, owing the discussion from classical authentication to trendy authentication approaches. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013 2013-10 2013-01-01T00:00:00Z 2015-07-24T11:25:45Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
format |
masterThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10400.6/3775 TID:201289873 |
url |
http://hdl.handle.net/10400.6/3775 |
identifier_str_mv |
TID:201289873 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799136347583152128 |