{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T10:10:39Z","timestamp":1686219039395},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,7,27]],"date-time":"2011-07-27T00:00:00Z","timestamp":1311724800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s00287-011-0559-2","type":"journal-article","created":{"date-parts":[[2011,7,26]],"date-time":"2011-07-26T09:47:11Z","timestamp":1311673631000},"page":"173-181","source":"Crossref","is-referenced-by-count":1,"title":["H\u00f6here IT-Sicherheit durch Context Computer"],"prefix":"10.1007","volume":"35","author":[{"given":"Heinz-J\u00fcrgen","family":"Burkhardt","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Prinoth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,27]]},"reference":[{"key":"559_CR1","unstructured":"Burkhardt HJ, Prinoth R (2005) Arbeitskontexte \u2013 Kapseln um sch\u00fctzenswerte Prozesse. Fraunhofer SIT. http:\/\/contextcomputer.org\/html\/materialien.html, letzter Zugriff 19.7.2011"},{"key":"559_CR2","unstructured":"http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/xen, letzter Zugriff 19.7.2011"},{"key":"559_CR3","unstructured":"http:\/\/www.commoncriteriaportal.org\/, letzter Zugriff 19.7.2011"},{"key":"559_CR4","unstructured":"http:\/\/contextcomputer.org\/, letzter Zugriff 19.7.2011"},{"key":"559_CR5","unstructured":"http:\/\/www.contextcomputer.org\/html\/haufige_fragen.html, letzter Zugriff 19.7.2011"},{"key":"559_CR6","unstructured":"http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/, letzter Zugriff 19.7.2011"},{"key":"559_CR7","unstructured":"http:\/\/www.emscb.com\/content\/pages\/opentc.htm, letzter Zugriff 19.7.2011"},{"key":"559_CR8","unstructured":"http:\/\/www.fidis.net\/, letzter Zugriff 19.7.2011"},{"key":"559_CR9","unstructured":"http:\/\/www.f-secure.com\/weblog\/archives\/00001637.html, letzter Zugriff 19.7.2011"},{"key":"559_CR10","unstructured":"http:\/\/www.heute.de\/ZDFheute\/inhalt\/11\/0,3672,8226667,00.html, letzter Zugriff 19.7.2011"},{"key":"559_CR11","unstructured":"http:\/\/www.itu.int\/rec\/T-REC-X.1252-201004-I\/en, letzter Zugriff 19.7.2011"},{"key":"559_CR12","unstructured":"http:\/\/www.kaspersky.com\/de\/news?id=207566365, letzter Zugriff 19.7.2011"},{"key":"559_CR13","unstructured":"http:\/\/www.linux.org, letzter Zugriff 19.7.2011"},{"key":"559_CR14","unstructured":"http:\/\/www.microsoft.com\/germany\/business\/cloudservices\/default.aspx, letzter Zugriff 19.7.2011"},{"key":"559_CR15","unstructured":"http:\/\/openid.net\/, letzter Zugriff 19.7.2011"},{"key":"559_CR16","doi-asserted-by":"crossref","unstructured":"http:\/\/www.phoenix.com, letzter Zugriff 19.7.2011","DOI":"10.1177\/110330881101900304"},{"key":"559_CR17","unstructured":"http:\/\/shibboleth.internet2.edu\/, letzter Zugriff 19.7.2011"},{"key":"559_CR18","unstructured":"https:\/\/www.trustedcomputinggroup.org, letzter Zugriff 19.7.2011"}],"container-title":["Informatik-Spektrum"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-011-0559-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00287-011-0559-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-011-0559-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T09:54:37Z","timestamp":1686218077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00287-011-0559-2"}},"subtitle":["Pl\u00e4doyer f\u00fcr einen Paradigmenwechsel"],"short-title":[],"issued":{"date-parts":[[2011,7,27]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["559"],"URL":"https:\/\/doi.org\/10.1007\/s00287-011-0559-2","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,27]]}}}