{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:00:01Z","timestamp":1742918401659,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":21,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_13","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"170-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The need of European White Knights for the TLS\/SSL Certificate System"],"prefix":"10.1007","author":[{"given":"Arno","family":"Fiedler","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"13_CR1","unstructured":"E. Rescorla: SSL and TLS. Designing and building secure systems. Addison-Wesley, New York NY u. a. 2001."},{"key":"13_CR2","unstructured":"OpenSSL Security Advisory vom 7. April 2014, reviewed on 30.06.2014."},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"K. Bhargavan, A. Delignat-Lavaud, Fournet, C., Pironti, A., and P. Strub, \u201cTriple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS\u201d, Unpublished draft , 2014.","DOI":"10.1109\/SP.2014.14"},{"key":"13_CR4","unstructured":"L. A. Kaplan, O. Lendl: Zwischenbericht DigiNotar Certificate Authority Hack und Relevanz f\u00fcr \u00d6sterreich, Cert.at. 2011."},{"key":"13_CR5","unstructured":"\u201cReport of incident on 15-MAR-2011\u201d. Comodo group. Reviewed on 30.06.2014"},{"key":"13_CR6","unstructured":"T. Duong, J. Rizzo: Here Come The Ninjas, 2011. (https:\/\/bug665814.bugzilla.mozilla.org\/attachment.cgi?Id=540839, reviewed on 30.06.2014)."},{"key":"13_CR7","unstructured":"J. Ball, J.Borger, and G. Greenwald \u201cUS and UK spy agencies defeat privacy and security on the internet\u201d. The Guardian, September 5, 2013. (http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security , reviewed on 30.06.2014)"},{"key":"13_CR8","unstructured":"B. Beck: LibreSSL \u2013 An OpenSSL replacement. The first 30 days,and where we go from here. BSDCAN 2014. (http:\/\/www.openbsd.org\/papers\/bsdcan14-libressl\/ , reviews on 30.06.2014."},{"key":"13_CR9","unstructured":"A. Langley: BoringSSL, https:\/\/www.imperialviolet.org\/2014\/06\/20\/boringssl.html und https:\/\/boringssl.googlesource.com\/?format=HTML, reviewed on 30.06.2014."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"J. Schwenk: Sicherheit und Kryptographie im Internet. Von sicherer E-Mail bis zu IP-Verschl\u00fcsselung, herausgegeben von Vieweg+Teubner Verlag \/ GWV Fachverlage GmbH, Wiesbaden, 2010.","DOI":"10.1007\/978-3-8348-9665-0_3"},{"key":"13_CR11","unstructured":"C.Eckert: IT-Sicherheit. Konzepte \u2013 Verfahren \u2013 Protokolle. 6. \u00fcberarbeitete Auflage. Oldenbourg, M\u00fcnchen u. a. 2009."},{"key":"13_CR12","unstructured":"A. Langley Enhancing digital certificate security, http:\/\/googleonlinesecurity.blogspot.de\/2013\/01\/enhancing-digital-certificate-security.html, reviewed on 30.06.2014."},{"key":"13_CR13","unstructured":"RFC 6698 \u2013 The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA"},{"key":"13_CR14","unstructured":"Pinning QUELLE"},{"key":"13_CR15","unstructured":"D. Barrett,R. Silverman,R. Byrnes: SSH, The Secure Shell: The Definitive Guide, O\u2019Reilly & Associates, 2005."},{"key":"13_CR16","unstructured":"RFC 6962 \u2013 Certificate Transparency, Experimental Request for Comments"},{"key":"13_CR17","unstructured":"RFC 6844 \u2013 DNS Certification Authority Authorization (CAA) Resource Record"},{"key":"13_CR18","unstructured":"CA\/Browser Forum, https:\/\/cabforum.org\/, reviewed on 30.06.2014"},{"key":"13_CR19","unstructured":"http:\/\/www.certificate-transparency.org\/ , reviewed on 30.06.2014"},{"key":"13_CR20","unstructured":"Certificate Transparency Log Policy, https:\/\/sites.google.com\/a\/chromium.org\/dev\/Home\/chromium-security\/certificate-transparency\/log-policy, reviewed on 30.06.2014"},{"key":"13_CR21","unstructured":"http:\/\/www.internetworldstats.com\/stats.htm, reviewed on 30.06.2014"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T15:13:05Z","timestamp":1676905985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_13","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}