{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:51Z","timestamp":1725528891606},"publisher-location":"Wiesbaden","reference-count":8,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_28","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"268-277","source":"Crossref","is-referenced-by-count":0,"title":["PPs for applications with the Spanish National Electronic Identity Card"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Vivancos","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","volume-title":"Colecci\u00f3n Ensayo-Actualidad","author":"M. Castells","year":"2003","unstructured":"Castells, M.: La galaxia Internet. Reflexiones sobre Internet empresa y sociedad. Barcelona, De Bolsillo, 2003, Colecci\u00f3n Ensayo-Actualidad, n.o 5."},{"key":"28_CR2","unstructured":"Espa\u00f1a, Jefatura del Estado LEY 59\/2003, de 19 de diciembre, de firma electr\u00f3nica. BOE, 2003, n. 304 de 20\/12\/2003, Art. 15"},{"key":"28_CR3","unstructured":"ISO\/IEC JTC 1\/SC27 N5792 Text for ISO\/IEC 3rd WD 15446. Information Technologies \u2014 Security Techniques. Guide for the production of protection profiles and security targets."},{"key":"28_CR4","unstructured":"Common Criteria. Common Criteria for Information Security Evaluation. Part 1 Introduction and general model. V. 3.1, [en l\u00ednea] 2006. CCMB-2006-09-003 http:\/\/www.commoncriteriaportal.org\/files\/ccfiles\/CCPART1V3.1R1.pdf [consulta: 08\/06\/2008]"},{"key":"28_CR5","unstructured":"PP1-EAL1. Perfil de Protecci\u00f3n para el control exclusivo de los medios de firma con nivel de evaluaci\u00f3n de los requisitos de seguridad del tipo EAL1."},{"key":"28_CR6","unstructured":"PP2-EAL3. Perfil de Protecci\u00f3n para el control exclusivo de los medios de firma con nivel de evaluaci\u00f3n de los requisitos de seguridad del tipo EAL3."},{"key":"28_CR7","unstructured":"PP3-EAL1. Perfil de Protecci\u00f3n para la aplicaci\u00f3n de creaci\u00f3n y verificaci\u00f3n de firma electr\u00f3nica con nivel de evaluaci\u00f3n de los requisitos de seguridad del tipo EAL1."},{"key":"28_CR8","unstructured":"PP4-EAL3. Perfil de Protecci\u00f3n para la aplicaci\u00f3n de creaci\u00f3n y verificaci\u00f3n de firma electr\u00f3nica con nivel de evaluaci\u00f3n de los requisitos de seguridad del tipo EAL3."}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:51Z","timestamp":1606134171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_28","relation":{},"subject":[]}}