{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:39:59Z","timestamp":1743122399155,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":25,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_20","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"241-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards eIDAS as a Service"],"prefix":"10.1007","author":[{"given":"Detlef","family":"H\u00fchnlein","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"20_CR86","unstructured":"[1999\/93\/EC] Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:31999L0093"},{"key":"20_CR87","unstructured":"[2014\/148\/EU] Commission Implementing Decision of 17 March 2014 amending Decision 2011\/130\/EU establishing minimum requirements for the cross-border processing of documents signed electronically by competent authorities under Directive 2006\/123\/EC of the European Parliament and of the Council on services in the internal market, notified under document C(2014) 1640, Text with EEA relevance, http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX-:32014D0148"},{"key":"20_CR88","unstructured":"[BSI TR-03125] Federal Office for Information Security: Preservation of Evidence of Cryptographically Signed Documents, BSI TR-03125, https:\/\/www.bsi.bund.de\/EN\/Publications\/TechnicalGuidelines\/TR03125\/BSITR03125.html"},{"key":"20_CR89","doi-asserted-by":"crossref","unstructured":"[BYV+09] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg & I. Brandic: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation computer systems, 25(6), 599-616, 2009, https:\/\/svn.inf.ufsc.br\/luis.custodio\/TCC-Dantas\/Artigos\/Bom\/10.1.1.144.8937.pdf","DOI":"10.1016\/j.future.2008.12.001"},{"key":"20_CR90","unstructured":"[CEN15480-3] Comit\u00e9 europ\u00e9en de normalisation (CEN): Identification card systems \u2014 European Citizen Card \u2014 Part 3: Interoperability using an application interface, CEN\/TS 15480-3, 2014"},{"key":"20_CR91","unstructured":"[COM(2012)238] European Commission: Proposal for a regulation of the European Pariament and of the Council on electronic identification and trust services for electronic transactions in the internal market, 2012, http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0238:FIN:EN:PDF"},{"key":"20_CR92","unstructured":"[eIDAS-PR] European Commission: Draft Regulation \u201con electronic identification and trusted services for electronic transactions in the internal market\u201d, Press Release 20.09.2012, http:\/\/ec.europa.eu\/digital-agenda\/en\/news\/draft-regulation-electronic-identification-and-trusted-services-electronic-transactions-0"},{"key":"20_CR93","unstructured":"[eIDAS-EP] European Parliament: Electronic identification and trust services for electronic transactions in the internal market, as adopted by the European Parliament on 3rd of April 2014, http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?type=TA&language=EN&reference=P7-TA-2014-0282 [ETSI102640] ETSI TS 102 640: Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM), Part 1-6"},{"key":"20_CR94","unstructured":"[HPS+12] D. H\u00fchnlein, P. Petrautzki, J. Schm\u00f6lz, T. Wich, M. Horsch, T. Wieland, J. Eichholz, A. Wiesmaier, J. Braun, F. Feldmann, S. Potzernheim, J. Schwenk, C. Kahlo, A. K\u00fchne, H. Veit: On the design and implementation of the Open eCcard App. In: Sicherheit 2012 GI-LNI (2012), http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings195\/95.pdf"},{"key":"20_CR95","unstructured":"[HHK+14] D. H\u00fchnlein, G. Hornung, M. Kubach, V. Mladenov, H. Ro\u00dfnagel, S. S\u00e4dtler, J. Schm\u00f6lz, T. Wich: SkIDentity \u2013 Trusted Identities for the Cloud, in [KRR14]"},{"key":"20_CR96","unstructured":"[ISO29115] ISO\/IEC 29115: Information technology \u2014 Security techniques \u2014 Entity authentication assurance framework, International Standard, 2013"},{"key":"20_CR97","unstructured":"[KRR14] H. Krcmar, R. Reussner, B. Rumpe (ed.): Trusted Cloud Computing, Springer, to appear"},{"key":"20_CR98","unstructured":"[MaM14] MarketsandMarkets: Cloud Computing Market (IaaS, PaaS, SaaS) to Reach $121.1 Billion by 2015 \u2013 New Report by MarketsandMarkets, Press Release 08.02.2014, http:\/\/www.prweb.com\/releases\/cloud-computing\/market\/prweb11560677.htm"},{"key":"20_CR99","unstructured":"[NIST-800-63-2] NIST: Electronic Authentication Guideline, Special Publication 800-63-2, August 2013, http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-63-2.pdf"},{"key":"20_CR100","unstructured":"[NIST-800-145] National Institute of Standards and Technology: The NIST definition of cloud computing, NIST special publication 800-145, http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-145, 2011"},{"key":"20_CR101","doi-asserted-by":"crossref","unstructured":"[RFC3161] C. Adams, P. Cain, D. Pinkas, R. Zuccherato: Internet X.509 Public Key Infrastructure \u2013 Time- Stamp Protocol (TSP), IETF RFC 3161, 2001, www.ietf.org\/rfc\/rfc3161.txt","DOI":"10.17487\/rfc3161"},{"key":"20_CR102","doi-asserted-by":"crossref","unstructured":"[RFC4998] T. Gondrom, R. Brandner, U. Pordesch: Evidence Record Syntax (ERS), IETF RFC 4998, 2007, www.ietf.org\/rfc\/rfc4998.txt","DOI":"10.17487\/rfc4998"},{"key":"20_CR103","doi-asserted-by":"crossref","unstructured":"[RFC6749] D. Hardt, Ed.: The OAuth 2.0 Authorization Framework, IETF RFC 6749, 2012, www.ietf.org\/rfc\/rfc6749.txt","DOI":"10.17487\/rfc6749"},{"key":"20_CR104","unstructured":"[SAML(v2.0)] S. Cantor, J. Kemp, R. Philpott, E. Maler: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, 15.03.2005, http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf, 2005"},{"key":"20_CR105","unstructured":"[STORK-D2.3] B. Hulsebosch, G. Lenzini, and H. Eertink: Quality authenticator scheme, STORK Deliverable D2.3, final, 03.03.2009, https:\/\/www.eid-stork.eu\/dmdocuments\/public\/D2.3_final._1.pdf"},{"key":"20_CR106","unstructured":"[STORK-D.5.8.1b] J. Alcalde-Mora\u00f1o, J. L. Hern\u00e1ndez-Ardieta, A. Johnston, D. Martinez, B. Zwattendorfer: STORK Deliverable D5.8.1b \u2013 Interface Specification, 08.09.2009, https:\/\/www.eid-stork.eu\/index.php?option=com_processes&Itemid=&act=streamDocument&did=960"},{"key":"20_CR107","doi-asserted-by":"crossref","unstructured":"[SuKa11] S. Subashini, V. Kavitha: A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34(1), 2011, pp. 1-11","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"20_CR108","doi-asserted-by":"crossref","unstructured":"[TJA10] H. Takabi, J. B. Joshi, and G. J. Ahn: Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, 8(6), 2010, pp. 24-31","DOI":"10.1109\/MSP.2010.186"},{"key":"20_CR109","unstructured":"[TC-Europe] European Commission: Establishing a Trusted Cloud Europe, A policy vision document by the Steering Board of the European Cloud Partnership, 2014, http:\/\/ec.europa.eu\/information_society\/newsroom\/cf\/dae\/document.cfm?doc_id=4935"},{"key":"20_CR110","unstructured":"[WHP+13] Wich, T., Horsch, M., Petrautzki, D., Schm\u00f6lz, J., H\u00fchnlein, D., Wieland, T., Potzernheim, S.: An extensible platform for eID, signatures and more, In: Proceedings of Open Identity Summit 2013, LNI, vol. 223, 2013. pp. 55\u201368, http:\/\/www.ecsec.de\/pub\/2013_OID_Platform.pdf"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:41:33Z","timestamp":1674175293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_20","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}