{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:39:38Z","timestamp":1725669578733},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292934"},{"type":"electronic","value":"9783642292941"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29294-1_16","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T13:28:44Z","timestamp":1332422924000},"page":"214-219","source":"Crossref","is-referenced-by-count":0,"title":["Subjective Security and Safety \u2013 S-BPM as a Base for the Description of Security and Safety Objectives"],"prefix":"10.1007","author":[{"given":"Max","family":"Dirndorfer","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Handy","sequence":"additional","affiliation":[]},{"given":"Josef","family":"Schneeberger","sequence":"additional","affiliation":[]},{"given":"Herbert","family":"Fischer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","first-page":"1665","volume-title":"Beck\u2019sches Notar-Handbuch","author":"J. Bettendorf","year":"2009","unstructured":"Bettendorf, J.: Dienstordnung und B\u00fcro. In: Brambring, G., Jerschke, H.-U. (eds.) Beck\u2019sches Notar-Handbuch, pp. 1665\u20131711. Beck Juristischer Verlag, M\u00fcnchen (2009)"},{"key":"16_CR2","unstructured":"Armbr\u00fcster, C., Preu\u00df, N., Renner, T.: Beurkundungsgesetz und Dienstordnung f\u00fcr Notarinnen und Notare: Kommentar. Gruyter (2008)"},{"key":"16_CR3","unstructured":"Wirtz, B.W.: E-Government: Grundlagen, Instrumente, Strategien. Gabler Verlag (2010)"},{"key":"16_CR4","unstructured":"Dirndorfer, M.: Konzeption eines Referenzmodells f\u00fcr die notarielle Kommunikation. Unpublished master thesis (2011)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Eckert, C.: IT-Sicherheit: Konzepte - Verfahren - Protokolle. Oldenbourg Wissenschaftsverlag (2009)","DOI":"10.1524\/9783486595970"},{"key":"16_CR6","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-15915-2_7","volume-title":"S-BPM ONE \u2013 Setting the Stage for Subject-Oriented Business Process Management","author":"A. Fleischmann","year":"2010","unstructured":"Fleischmann, A.: What Is S-BPM? In: Buchwald, H., Fleischmann, A., Seese, D., Stary, C. (eds.) S-BPM ONE 2009. CCIS, vol.\u00a085, pp. 85\u2013106. Springer, Heidelberg (2010)"},{"key":"16_CR7","unstructured":"Johansson, J.M.: Sicherheit auf dem Pr\u00fcfstand Subjekte und Sicherheitsprinzipale, http:\/\/technet.microsoft.com\/de-de\/query\/dd297621"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Kersten, H., Klett, G.: Der It Security Manager: Expertenwissen f\u00fcr jeden It Security Manager- von namhaften Autoren praxisnah vermittelt. Vieweg + Teubner (2008)","DOI":"10.1007\/978-3-8348-9239-3"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Bedner, M., Ackermann, T.: Schutzziele der IT-Sicherheit. Datenschutz und Datensicherheit, 323\u2013328","DOI":"10.1007\/s11623-010-0096-1"},{"key":"16_CR10","unstructured":"Schumacher, M.: Security patterns: integrating security and systems engineering. John Wiley & Sons (2006)"},{"key":"16_CR11","unstructured":"Federrath, H., Pfitzmann, A.: Gliederung und Systematisierung vonSchutzzielen in IT-Systemen. Datenschutz und Datensicherheit, 704\u2013710 (2000)"},{"key":"16_CR12","unstructured":"Dirndorfer, M., Handy, B.: Internalpaper on Describing and Documenting IT Security Objectives in the Notarial Context (2011)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Fleischmann, A., Stary, C.: Whom to talk to? A stakeholder perspective on business process development. Universal Access in the Information Society (2011)","DOI":"10.1007\/s10209-011-0236-x"},{"key":"16_CR14","unstructured":"Heinrich, R., Kappe, A., Paech: Modeling Quality Information within Business Process Models. Tagungsband 4. Workshop zur Software-Qualit\u00e4tsmodellierung und -bewertung, pp. 4\u201313. Institut f\u00fcr Informatik der TU M\u00fcnchen (2011)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Jensen, M., Feja, S.: A Security Modeling Approach for Web-Service-based Business Processes. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 340\u2013347 (2009)","DOI":"10.1109\/ECBS.2009.14"},{"key":"16_CR16","volume-title":"ACM 27th Symposium on Applied Computing","author":"G. Monakova","year":"2012","unstructured":"Monakova, G., Brucker, A.D., Schaad, A.: Security and Safety of Assets in Business Processes. In: ACM 27th Symposium on Applied Computing. ACM Press, New York (2012)"}],"container-title":["Communications in Computer and Information Science","S-BPM ONE - Education and Industrial Developments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29294-1_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:34:39Z","timestamp":1620113679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29294-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292934","9783642292941"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29294-1_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}