{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:10:34Z","timestamp":1760983834902},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229162"},{"type":"electronic","value":"9783540300786"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30078-6_56","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T19:28:46Z","timestamp":1284665326000},"page":"336-341","source":"Crossref","is-referenced-by-count":6,"title":["Securing e-Government"],"prefix":"10.1007","author":[{"given":"Sonja","family":"Hof","sequence":"first","affiliation":[]},{"given":"Peter","family":"Reichst\u00e4dter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","unstructured":"H\u00f6rbe, R.: Portal Verbund: White Paper, 28 (February 2002), http:\/\/www.cio.gv.at"},{"key":"56_CR2","unstructured":"DOMEA concept, http:\/\/www.kbst.bund.de"},{"key":"56_CR3","unstructured":"General Information on ELAK, www.cio.gv.at\/elektronischerAkt\/ , or www.elakimbund.at"},{"key":"56_CR4","unstructured":"http:\/\/www.isb.admin.ch\/internet\/gever\/business\/01160\/?lang=de"},{"key":"56_CR5","unstructured":"http:\/\/www.cio.gv.at\/it-infrastructure\/delivery"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Reichst\u00e4dter, P.: E-Signatures for Delivery in E-Government. In: Proc. E-Government 2003, pp. 260\u2013265 (2003)","DOI":"10.1007\/10929179_47"},{"key":"56_CR7","unstructured":"Reichst\u00e4dter, P., Hollosi, A.: Model and processes of electronic delivery in E-Government, http:\/\/www.cio.gv.at\/it-infrastructure\/delivery\/spec"},{"issue":"2","key":"56_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/966389.966392","volume":"47","author":"C.C. Albrecht","year":"2004","unstructured":"Albrecht, C.C.: How clean is the Future of SOAP? Com. of the ACM\u00a047(2), 66\u201368 (2004)","journal-title":"Com. of the ACM"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Srikant, R.: Technological Solution for Protecting Privacy. IEEE Computer, 115\u2013118 (September 2003)","DOI":"10.1109\/MC.2003.1231199"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.: XML-Based Specification for Web Services Document Security. IEEE Computer, 41\u201349 (April 2004)","DOI":"10.1109\/MC.2004.1297300"},{"key":"56_CR11","unstructured":"King, C.M., Dalton, C.E., Osmanoglu, T.E.: Security Architecture, p. 93. RSA Press (2001)"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Vaughan-Nichols, S.J.: XML Raises Concerns as it gains Prominence. IEEE Computer, 14\u201316 (May 2003)","DOI":"10.1109\/MC.2003.1198228"},{"issue":"1","key":"56_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/637958.637961","volume":"1","author":"S. Kleijnen","year":"2003","unstructured":"Kleijnen, S., Raju, S.: An Open Web Service Architecture. ACM Queue\u00a01(1), 40\u201346 (2003)","journal-title":"ACM Queue"},{"key":"56_CR14","unstructured":"G\u00f6rtz, R., Stolp, J.: Sicherheit effektiv integrieren. in IT-Security 01\/02-2002, pp. 20-38"},{"key":"56_CR15","unstructured":"Kahmen, M.: Authentifizierung- Wer braucht sie?, in IT-Security 05\/, pp. 18\u201320 (2002)"},{"issue":"6","key":"56_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/777313.777327","volume":"46","author":"R.T. Mercuri","year":"2003","unstructured":"Mercuri, R.T.: Analyzing Security Costs. Com. Of the ACM\u00a046(6), 15\u201318 (2003)","journal-title":"Com. Of the ACM"},{"issue":"6","key":"56_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/777313.777315","volume":"46","author":"H. Wang","year":"2003","unstructured":"Wang, H., Wang, C.: Taxonomy of Security Considerations and Software Quality. Com. Of the ACM\u00a046(6), 75\u201378 (2003)","journal-title":"Com. Of the ACM"},{"issue":"6","key":"56_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/777313.777319","volume":"46","author":"P.E. Hart","year":"2003","unstructured":"Hart, P.E., Liu, Z.: Trust in the Perservation of Digital Information. Com. Of the ACM\u00a046(6), 93\u201397 (2003)","journal-title":"Com. Of the ACM"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30078-6_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:39:41Z","timestamp":1605760781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30078-6_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229162","9783540300786"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30078-6_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}