{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:05:10Z","timestamp":1725728710818},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540184782"},{"type":"electronic","value":"9783662011102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-662-01110-2_35","type":"book-chapter","created":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T20:05:22Z","timestamp":1370289922000},"page":"477-492","source":"Crossref","is-referenced-by-count":1,"title":["Gestaltung und Betrieb von verteilten B\u00fcrosystemen: Management Tools und Informationssicherheit"],"prefix":"10.1007","author":[{"given":"Helmut","family":"Meitner","sequence":"first","affiliation":[]},{"given":"Andreas J.","family":"Ness","sequence":"additional","affiliation":[]},{"given":"Friedemann","family":"Reim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","first-page":"433","volume-title":"Information Security","author":"M Achemlal","year":"1986","unstructured":"Achemlal, M., Mourier, M., Lorette, G., Bonnefoy, J.P. (1986): Dynamic Signature Verification. In: A. Grissonnanche (Ed.): Information Security: The Challenge, Pre-prints of the Fourth IFIP Security Conference of Information Systems Security, S. 433\u2013441, 1986."},{"key":"35_CR2","first-page":"147","volume-title":"Security, IFIP\/Sec83","author":"WA Bound","year":"1983","unstructured":"Bound, W.A.J.; Ruth, D.R. (1983): Risk Management\u2013How can it become a useful Tool. In: Fak, V.A. (Ed.): Security, IFIP\/Sec\u201983. North-Holland Publishing Company, S. 147\u2013160, 1983."},{"key":"35_CR3","unstructured":"ECMA (1986): European Computer Manufacturers Association: Framework for Distributed Office Applications. ECMA TC32\u2013TG5, December, 1986."},{"key":"35_CR4","unstructured":"DoDCSC (1983): Department of Defense Trusted Computer System Evaluation Criteria. U.S. Department of Defense Computer Security Center, DoD 5200.28-STD, 1983."},{"key":"35_CR5","first-page":"24","volume-title":"Funkschau, 13\/1986","author":"Funkschau","year":"1986","unstructured":"Funkschau (1986): Schl\u00fcssel, Ausweis, Geldersatz. In: Funkschau, 13\/1986, S. 24\u201328, 1986."},{"key":"35_CR6","first-page":"395","volume-title":"Information Security","author":"VD Gligor","year":"1986","unstructured":"Gligor, V.D.; Chandersekaran, C.S.: Towards the Development of Secure Distributed Systems. In: A. Grissonnanche (Ed.): Information Security: The Challenge, Pre-prints of the Fourth IFIP Security Conference of Information Systems Security, S. 395\u2013406, 1986."},{"key":"35_CR7","first-page":"1986","volume-title":"Probleml\u00f6sungsmethoden f\u00fcr die organisatorische Gestaltung von B\u00fcrosystemen","author":"P Hirsch","year":"1986","unstructured":"Hirsch, P. (1986): Probleml\u00f6sungsmethoden f\u00fcr die organisatorische Gestaltung von B\u00fcrosystemen. Diplomarbeit an der Universit\u00e4t Stuttgart\/IFF, Dezember 1986."},{"key":"35_CR8","first-page":"44","volume-title":"Computer magazin, Jg. 16, Heft","author":"BE Meyer","year":"1987","unstructured":"Meyer, B.E. (1987): Zulieferer, Hersteller, Kunde\u2013Direktverbund. In: computer magazin, Jg. 16, Heft 4, S. 44\u201348."},{"key":"35_CR9","first-page":"307","volume-title":"Computer Security: A Global Challenge. IFIP\/Sec 84","author":"J Miguel","year":"1984","unstructured":"Miguel, J. (1984): A Composite Cost\/Benefit\/Risk Analysis Methodology. In: Finch, J.H.; Dougall, E.G. (Ed.): Computer Security: A Global Challenge. IFIP\/Sec\u2019 84, Elsevier Science Publishers, S. 307\u2013311, 1984"},{"key":"35_CR10","unstructured":"ISO (1986): Proposed Draft Addendum 2 to ISO 7498 on Security Architecture, International Organization for Standardization TC 97\/SC 21 N 931, 1986\u201301\u201330."},{"key":"35_CR11","first-page":"834","volume-title":"Decision Support System for Planning and Design of Distributed Office Systems. Deliverable FHG-D1-T1.1-860829 of Esprit Project","author":"AJ Ness","year":"1986","unstructured":"Ness, A.J.; Reim, F.; Meitner, H.; Niemeier J. (1986): Decision Support System for Planning and Design of Distributed Office Systems. Deliverable FHG-D1\u2013T1.1\u2013860829 of ESPRIT Project 834 ( COMANDOS), Universit\u00e4t Stuttgart and Fraunhofer-Institut f\u00fcr Arbeitswirtschaft und Organisation, Stuttgart."},{"key":"35_CR12","unstructured":"Ness, A.J.; Reim, F. (1987): Planungs-und Gestaltungswerkzeuge f\u00fcr verteilte B\u00fcrosysteme\u2013Eine Ubersicht und Ansatzpunkte f\u00fcr eine Methodenintegration. Online \u201887, Kongre\u00df VII, Hamburg, 4\u20137 February 1987, (in German)"},{"key":"35_CR13","first-page":"834","volume-title":"Global Architecture of the Tools, Chapter 3 of the Intermediate Report on the Global Architecture. IAO\/ICL-D1-T2.1-870228, Esprit Project","author":"AJ Ness","year":"1987","unstructured":"Ness, A.J.; Reim, F.; Meitner, H.; Percy, R.; Dowler, B. (1987): Global Architecture of the Tools, Chapter 3 of the Intermediate Report on the Global Architecture. IAO\/ICL-D1\u2013T2.1\u2013870228, ESPRIT Project 834 ( COMANDOS), Universit\u00e4t Stuttgart, Fraunhofer-Institut f\u00fcr Arbeitswirtschaft und Organisation, Stuttgart, und International Computers Limited, Basingstoke."},{"key":"35_CR14","first-page":"834","volume-title":"Configuration and Performance Modelling. Deliverable ICL-D1-T1.1-860829 of Esprit Project","author":"R Percy","year":"1986","unstructured":"Percy, R. (1986a): Configuration and Performance Modelling. Deliverable ICL-D1\u2013T1.1\u2013860829 of ESPRIT Project 834 ( COMANDOS), International Computers Limited, Basingstoke."},{"key":"35_CR15","first-page":"834","volume-title":"Tools for Operational Control of the Online System. Deliverable ICL-D1-T1.1860829 of Esprit Project","author":"R Percy","year":"1986","unstructured":"Percy, R. (1986b): Tools for Operational Control of the Online System. Deliverable ICL-D1\u2013T1.1860829 of ESPRIT Project 834 ( COMANDOS), International Computers Limited, Basingstoke."},{"key":"35_CR16","first-page":"1985","volume-title":"Management Strategies for Computer Security. Butterworth Publishers","author":"WE Perry","year":"1985","unstructured":"Perry, W.E. (1985): Management Strategies for Computer Security. Butterworth Publishers, Boston, London, 1985."},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Simon, H.A. (1960): The New Science of Management Decision. New York, 1960.","DOI":"10.1037\/13978-000"}],"container-title":["Informatik-Fachberichte","GI \u2014 17. Jahrestagung Computerintegrierter Arbeitsplatz im B\u00fcro"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-01110-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T17:30:32Z","timestamp":1557768632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-01110-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540184782","9783662011102"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-01110-2_35","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}