{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T11:15:27Z","timestamp":1771758927297,"version":"3.50.1"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031842597","type":"print"},{"value":"9783031842603","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84260-3_3","type":"book-chapter","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T14:50:21Z","timestamp":1741013421000},"page":"43-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Long-Term Storage Security in\u00a0Critical Infrastructures Under NIS2 Directive: Addressing Post-quantum Cryptography Challenges"],"prefix":"10.1007","author":[{"given":"Nino","family":"Ricchizzi","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Langner","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Pelzl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"3_CR1","unstructured":"ISO\/TC\u00a020\/SC 13. ISO 14721:2012 space data and information transfer systems - open archival information system (OAIS) - Reference model. Standard, International Organization for Standardization (ISO), Geneva, CH, September 2012"},{"key":"3_CR2","unstructured":"ISO\/IEC JTC\u00a01\/SC 27. ISO\/IEC 27001: information technology \u2013 security techniques \u2013 information security management systems \u2013 requirements. ISO Standard, October 2022. http:\/\/www.iso.org\/iso\/home\/standards\/management-standards\/iso27001.htm"},{"key":"3_CR3","unstructured":"Carlisle Adams and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, 2 edition, November 2002"},{"key":"3_CR4","unstructured":"Linux Foundation\u2019s Post-Quantum\u00a0Cryptography Alliance. Open Quantum Safe: software for the transition to quantum-resistant cryptography. webpage"},{"key":"3_CR5","unstructured":"An, H. and Kim, K.: QChain: quantum-resistant and decentralized PKI using blockchain. In: 2018 Symposium on Cryptography and Information Security (SCIS), Niigata, Japan, January 2018. The Institute of Electronics, Information and Communication Engineers. Graduate School of Information Security, KAIST, 291, Daehak-ro, Yuseong-gu, Daejeon, South Korea 34141"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., Lange, T., Rekleitis, E.: Post-quantum cryptography integration study. Technical report, European Union Agency for Cybersecurity (ENISA), October 2022. ISBN: 978-92-9204-590-6, https:\/\/doi.org\/10.2824\/151162, Catalogue Number: TP-03-22-080-EN-N","DOI":"10.2824\/151162"},{"key":"3_CR7","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI). Status of quantum computer development. Technical Report 2.0, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, August 2023. Accessed 17 Mar 2024"},{"key":"3_CR8","unstructured":"Bundesrepublik Deutschland. Zivilprozessordnung. Bundesgesetzblatt (BGBl. I S. 3202), December 2005. letzte \u00c4nderung durch Art. 5 und 6 G vom 8. Oktober 2023"},{"key":"3_CR9","unstructured":"Bundesrepublik Deutschland. Personenstandsgesetz (PStG). Bundesgesetzblatt, Februar 2007. Vom 19. Februar 2007 (BGBl. I S. 122), zuletzt ge\u00e4ndert durch Artikel 3 des Gesetzes vom 17. Juli 2023 (BGBl. 2023 I Nr. 190)"},{"key":"3_CR10","unstructured":"Bundesrepublik Deutschland. Gesetz \u00fcber das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI-Gesetz - BSIG), volume BGBl. I S. 2821. Bundesrepublik Deutschland, 2009. Zuletzt ge\u00e4ndert durch Artikel 12 des Gesetzes vom 23. Juni 2021 (BGBl. I S. 1982)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L., et al.: Report on post-quantum cryptography. Technical report, National Institute of Standards and Technology, http:\/\/dx.doi.org\/10.6028\/NIST.IR.8105, April 2016","DOI":"10.6028\/NIST.IR.8105"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Paar, C., Pelzl, J., G\u00fcneysu, T.: Understanding cryptography: from established symmetric and asymmetric ciphers to post-quantum algorithms. Springer Verlag (2024)","DOI":"10.1007\/978-3-662-69007-9"},{"key":"3_CR13","unstructured":"Consultative Committee for Space Data Systems (CCSDS). Recommendation for Space Data System Practices: Reference Model for an Open Archival Information System (OAIS). Recommended Practice CCSDS 650.0-P-3, CCSDS Secretariat, Space Communications and Navigation Office, NASA Headquarters, Washington, DC, USA, April 2019. PINK (PRE-MAGENTA) BOOK"},{"key":"3_CR14","unstructured":"Der Grosse Rat des Kantons Basel-Stadt. Gesetz \u00fcber das Archivwesen (Archivgesetz), September 1996. Vom 11. September 1996, Stand 1. Januar 2012"},{"key":"3_CR15","unstructured":"Hessisches\u00a0Ministerium des Innern und\u00a0f\u00fcr Sport. Verschlusssachenanweisung (VS-Anweisung, VSA) f\u00fcr das Land Hessen. Verwaltungsvorschrift des Hessischen Ministeriums des Innern und f\u00fcr Sport, February 2010. G\u00fcltig ab 01. Mai 2010, Aktenzeichen Z 1 - 03 a 08.08"},{"key":"3_CR16","unstructured":"Deutsche Nationalbibliothek. Langzeitarchivierungssystem koala. online, 2019. Unser kooperatives Langzeitarchivierungssystem koala \u00fcbernimmt die Aufgabe der dauerhaften Speicherung digitaler Objekte. Das System wurde in Kooperation mit der Gesellschaft f\u00fcr wissenschaftliche Datenverarbeitung mbH G\u00f6ttingen (GWDG) entwickelt und l\u00f6ste 2017 das Digital Information Archiving System (DIAS) ab. Die Deutsche Nationalbibliothek ist als vertrauensw\u00fcrdiges digitales Langzeitarchiv gepr\u00fcft und zertifiziert"},{"key":"3_CR17","unstructured":"Deutscher Bundestag. Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Dr. Anna Christmann, Kai Gehring, Margit Stumpp, weiterer Abgeordneter und der Fraktion B\u00dcNDNIS 90 \/ DIE GR\u00dcNEN. Drucksache 19\/24762, 2021. Zugriff auf Dokumente des Deutschen Bundestages"},{"key":"3_CR18","unstructured":"Deutscher Bundestag. Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Dr. Konstantin von Notz, Tabea R\u00f6\u00dfner, Dr. Irene Mihalic, weiterer Abgeordneter und der Fraktion B\u00dcNDNIS 90 \/ DIE GR\u00dcNEN. Drucksache 19\/25549, 2021. Zugriff auf Dokumente des Deutschen Bundestages"},{"key":"3_CR19","unstructured":"Deutsches Institut f\u00fcr Normung, Berlin, Germany. Information und Dokumentation \u2013 Kriterien f\u00fcr vertrauensw\u00fcrdige digitale Langzeitarchive, 2012-04 edition, April 2012. Available from Beuth Verlag GmbH"},{"key":"3_CR20","unstructured":"Dimitrios Chatziamanetoglou and Konstantinos Rantos. On the implementation of x509-compliant quantum-safe hybrid certificates. Technical Report STO-MP-IST-SET-198-A1-02, NATO Communications and Information Agency, Obourg, 7034, Hainaut, Belgium; Ag. Loukas, 65404, Kavala, Greece (2022)"},{"key":"3_CR21","unstructured":"DIN-Normenausschuss Bibliotheks- und Dokumentationswesen (NABD). DIN 31647: Information und Dokumentation \u2013 Beweiserterhaltung kryptographisch signierter Dokumente. Beuth Verlag GmbH, May 2015"},{"key":"3_CR22","unstructured":"Ehlen, S., et al.: Quantum-safe cryptography \u2013 fundamentals, current developments and recommendation. Federal Office for Information Security (BSI), Godesberger Allee 185\u2013189, 53175 Bonn, Germany, October 2021. This brochure is part of the Federal Office for Information Security\u2019s public relations work. It is provided free of charge and is not intended for sale"},{"key":"3_CR23","unstructured":"Apple\u00a0Security Engineering and Architecture (SEAR). iMessage with PQ3: The new state of the art in quantum-secure messaging at scale. webpage, Februar 2024"},{"key":"3_CR24","unstructured":"European Parliament and Council of the European Union. Directive (EU) 2022\/2555 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and repealing Directive (EU) 2016\/1148. Official Journal of the European Union, 2022. OJ L 333, 27.12.2022, p. 80"},{"key":"3_CR25","unstructured":"European Parliament and the Council of the European Union. Regulation (EC) No 1907\/2006 concerning the Registration, Evaluation, Authorisation and Restriction of Chemicals (REACH), establishing a European Chemicals Agency, amending Directive 1999\/45\/EC and repealing Council Regulation (EEC) No 793\/93 and Commission Regulation (EC) No 1488\/94 as well as Council Directive 76\/769\/EEC and Commission Directives 91\/155\/EEC, 93\/67\/EEC, 93\/105\/EC and 2000\/21\/EC. Official Journal of the European Union, 2006. Accessed on 01\/12\/2023"},{"key":"3_CR26","unstructured":"European Parliament and the Council of the European Union. Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj, July 2014. Document 32014R0910, In force"},{"key":"3_CR27","unstructured":"European Parliament and the Council of the European Union. Directive (EU) 2015\/849 of the European Parliament and of the Council of 20 May 2015 on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing, amending Regulation (EU) No 648\/2012 of the European Parliament and of the Council, and repealing Directive 2005\/60\/EC of the European Parliament and of the Council and Commission Directive 2006\/70\/EC. Official Journal of the European Union, 2015. Accessed 01 Dec 2023"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Factor, M., et al.: Preservation DataStores: architecture for preservation aware storage. In: 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), pp. 3 \u2013 15, October 2007","DOI":"10.1109\/MSST.2007.4367960"},{"key":"3_CR29","unstructured":"DIN Deutsches\u00a0Institut f\u00fcr Normung\u00a0e. V. DIN 31646: Preservation of archival and library materials - Requirements for storage in libraries, archives and museums, December 2023. DIN 31646:2023-12"},{"key":"3_CR30","unstructured":"Germany. Signaturverordnung (SigV), 2001. Repealed by the law from 18.07.2017, BGBl. I S. 2745"},{"key":"3_CR31","unstructured":"Germany. Vertrauensdienstegesetz (VDG). Bundesgesetzblatt Teil I, July 2017. \"Vertrauensdienstegesetz vom 18. Juli 2017 (BGBl. I S. 2745), ge\u00e4ndert durch Artikel 2 des Gesetzes vom 18. Juli 2017 (BGBl. I S. 2745)\""},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"433","DOI":"10.22331\/q-2021-04-15-433","volume":"5","author":"C Gidney","year":"2021","unstructured":"Gidney, C., Eker\u00e5, M.: How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5, 433 (2021)","journal-title":"Quantum"},{"key":"3_CR33","unstructured":"Gorniak, S., Koerting, S., Ombelli, D., Tirtea, R., Ikonomou, D. :National eIDs in pan-European e-Government Services, https:\/\/www.enisa.europa.eu\/, January 2010. Accessed 18 Mar 2024"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, STOC 1996, pp. 212\u2013219, New York, NY, USA, 1996. Association for Computing Machinery","DOI":"10.1145\/237814.237866"},{"key":"3_CR35","unstructured":"Schildt, S.H., Hoffmann, B., Oppelt, J., Welticke, J. (eds.) IT-Grundschutz-Kompendium. Reguvis Fachmedien GmbH, K\u00f6ln, 6 edition, 2023. Erscheinungsdatum (2023)"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Housley, R.: Update to the Cryptographic Message Syntax (CMS) for Algorithm Identifier Protection. RFC 8933, Internet Engineering Task Force (IETF), October 2020. Updates RFC 5652","DOI":"10.17487\/RFC8933"},{"key":"3_CR37","unstructured":"H\u00fchnlein, D., Korte, U.: Rechtliche Rahmenbedingungen der elektronischen Rechnung. In Jana Dittmann, editor, Sicherheit 2006: Sicherheit - Schutz und Zuverl\u00e4ssigkeit, Beitr\u00e4ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00fcr Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg, vol. P-77, pp. 256\u2013269. GI, January 2006"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Ning, K.-C., Schwabe, P., Weber, F.J., Zimmermann, P.R.: Post-quantum WireGuard. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 304\u2013321 (2021)","DOI":"10.1109\/SP40001.2021.00030"},{"key":"3_CR39","unstructured":"Kampanakis, P., Panburana, P., Daw, E., Van Geest, D.: The Viability of Post-quantum X.509 Certificates. Cryptology ePrint Archive, Paper 2018\/063 (2018)"},{"key":"3_CR40","unstructured":"Kampanakis, P., Sikeridis, D.: Two PQ signature use-cases: non-issues, challenges and potential solutions. Cryptology ePrint Archive, Paper 2019\/1276 (2019)"},{"key":"3_CR41","unstructured":"K\u00e4rberg, T., et al.: Hans Fredrik Berg, Bj\u00f6rn Skog, Henrik Ek, and Karin Bredenberg. SIP specification, records export requirements, transfer and ingest, Best Practice (2018)"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Kong, I.: Transitioning towards quantum-safe government: examining stages of growth models for quantum-safe public key infrastructure systems. In: Proceedings of the 15th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2022, pp. 499\u2013503, New York, NY, USA, Association for Computing Machinery (2022)","DOI":"10.1145\/3560107.3560182"},{"key":"3_CR43","unstructured":"Kwiatkowski, K., Valenta, L.: The TLS post-quantum experiment. webpage, October 2019"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Mavroeidis, V., Vishi, K., Zych, M.D., J\u00f8sang, A.: the impact of quantum computing on present cryptography. CoRR, abs\/1804.00200 (2018)","DOI":"10.14569\/IJACSA.2018.090354"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Merkle., R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.), Advances in Cryptology \u2014 CRYPTO 1987, pp. 369\u2013378, Berlin, Heidelberg (1988)","DOI":"10.1007\/3-540-48184-2_32"},{"key":"3_CR46","unstructured":"Mosca, M.: Cybersecurity in a quantum world: will we be ready? April 2015. University of Waterloo, Institute for Quantum Computing, CryptoWorks21"},{"key":"3_CR47","unstructured":"North Atlantic Treaty Organization. Security Within the North Atlantic Treaty Organization (NATO). Note by the Secretary General, November 2020. Revision 1 to C-M(2002)49 dated 17 June 2002"},{"key":"3_CR48","unstructured":"O\u2019Brien, D.: Protecting chrome traffic with hybrid Kyber KEM. webpage, August 2023"},{"key":"3_CR49","unstructured":"Office of\u00a0Parliamentary\u00a0Counsel, editor. National Greenhouse and Energy Reporting Act 2007. No. 175, 2007. Office of Parliamentary Counsel, Canberra, compilation no. 25 edition, 2024. Compilation date: 20 March 2024, Includes amendments: Act No. 74, 2023, Registered: 3 April 2024"},{"key":"3_CR50","unstructured":"Ott, D., Peikert, C., and other\u00a0workshop participants. Identifying research challenges in post quantum cryptography migration and cryptographic agility 2019"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners, 1st edn. Springer Publishing Company, Incorporated (2009)","DOI":"10.1007\/978-3-642-04101-3_1"},{"issue":"3","key":"3_CR52","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1080\/19393555.2020.1723747","volume":"29","author":"STP Singh","year":"2020","unstructured":"Singh, S.T.P., Gupta, S.: Malware detection in PDF and office documents: a survey. Inf. Secur. J. Global Perspect. 29(3), 134\u2013153 (2020)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Raavi, M., Chandramouli, P., Wuthier, S., Zhou, X., Chang, S.-Y.: Performance characterization of post-quantum digital certificates. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20139 (2021)","DOI":"10.1109\/ICCCN52240.2021.9522179"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Rahmanto, K.N., Riasetiawan, M.: Data preservation process in big data environment using open archival information system. In: 2018 4th International Conference on Science and Technology (ICST), pp. 1\u20135 (2018)","DOI":"10.1109\/ICSTC.2018.8528669"},{"key":"3_CR55","unstructured":"Fran\u00e7aise, R.: Code de la sant\u00e9 publique. L\u00e9gifrance, 2023. Accessed 01 Dec 2023"},{"key":"3_CR56","unstructured":"SCOPE. OAIS-Conform Archive Solutions. Website (2024). Accessed 13 May 2024"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. IACR Cryptol. ePrint Arch., 2020:71, 2020","DOI":"10.14722\/ndss.2020.24203"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Sosnowski, M., et al.: The performance of post-quantum TLS 1.3. In: Companion of the 19th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT 2023, pp. 19\u201327, New York, NY, USA, Association for Computing Machinery (2023)","DOI":"10.1145\/3624354.3630585"},{"key":"3_CR60","unstructured":"Todd, M.: File formats for preservation. DPC Technology Watch Report. Accessed December 1:2014, 2009"},{"key":"3_CR61","unstructured":"U.S. Department of Defense. Csi cnsa 2.0 faq. online, Sep 2022. Frequently Asked Questions for the Commercial Solutions for Classified Program National Security Agency (NSA) Commercial National Security Algorithm Suite (CNSA) 2.0"},{"key":"3_CR62","unstructured":"U.S. environmental protection agency. National primary drinking water regulations. Technical report, U.S. Environmental Protection Agency, 2003. Accessed 14 May 2024"},{"key":"3_CR63","unstructured":"Wiesmaier, A., Alnahawi, N., Grasmeyer, T.: Julian Gei\u00dfler. Pia Bauspie\u00df, and Andreas Heinemann. On PQC Migration and Crypto-Agility, Alexander Zeier (2021)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84260-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T14:50:33Z","timestamp":1741013433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84260-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031842597","9783031842603"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84260-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}