{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T19:22:24Z","timestamp":1725650544757},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540571926"},{"type":"electronic","value":"9783642784866"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/978-3-642-78486-6_59","type":"book-chapter","created":{"date-parts":[[2012,1,8]],"date-time":"2012-01-08T17:17:00Z","timestamp":1326043020000},"page":"347-353","source":"Crossref","is-referenced-by-count":0,"title":["IT Security Evaluation Improvement by Application of Testing"],"prefix":"10.1007","author":[{"given":"Wolfgang","family":"J\u00fcrgensen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","unstructured":"US Department of Defense: Trusted Computer Systems Evaluation Criteria (TCSEC), DoD 5200.28-STD, Dec. 85"},{"key":"59_CR2","volume-title":"Provisional Harmonised Criteria","author":"Information Technology Security Evaluation Criteria (ITSEC)","year":"1991","unstructured":"Information Technology Security Evaluation Criteria (ITSEC), Provisional Harmonised Criteria, V 1.2, June 1991"},{"key":"59_CR3","unstructured":"Information Technology Security Evaluation Manual (ITSEM), Draft V0.2, 1992"},{"key":"59_CR4","doi-asserted-by":"crossref","unstructured":"K. Thompson: Reflections on Trusting Trust, CACM, Vol. 27, No. 8, Aug. 84, pp. 761\u2013763","DOI":"10.1145\/358198.358210"},{"key":"59_CR5","first-page":"8807","volume-title":"LOTOS \u2014 A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour, ISO\/TC97\/SC21","author":"ISO","year":"1988","unstructured":"ISO: LOTOS \u2014 A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour, ISO\/TC97\/SC21, IS 8807, 1988"},{"key":"59_CR6","unstructured":"ISO: OSI \u2014 Conformance Testing Methodology and Framework \u2014 Part 1: General Concepts (ISO 9646\u20131)"},{"key":"59_CR7","unstructured":"R. Cadwallader et al.: Infosec 92 S2013 Security Investigations Testing & Accreditation Review (SITAR) Final Report to the Commission of the European Communities, Jan. 93"}],"container-title":["Informatik aktuell","Informatik \u2014 Wirtschaft \u2014 Gesellschaft"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-78486-6_59.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T12:59:35Z","timestamp":1620305975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-78486-6_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540571926","9783642784866"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-78486-6_59","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[1993]]}}}