{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:38:13Z","timestamp":1648913893424},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,2]]},"DOI":"10.1007\/s11623-006-0027-3","type":"journal-article","created":{"date-parts":[[2006,6,24]],"date-time":"2006-06-24T03:15:27Z","timestamp":1151118927000},"page":"98-101","source":"Crossref","is-referenced-by-count":1,"title":["Automatisiertes Management von Datenschutzrechten"],"prefix":"10.1007","volume":"30","author":[{"given":"Jan","family":"M\u00f6ller","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Ashley, Paul, Hada, Satoshi, Karjoth, G\u00fcnter, Powers, Calvin, Schunter, Matthias, The Enterprise Privacy Authorization Language (EPAL) \u2014 How to Enforce Privacy throughout an Enterprise http:\/\/www.w3.org\/2003\/p3p-ws\/pp\/ibm3.html"},{"key":"27_CR2","unstructured":"Beres, Yolanta, Bramhall, Pete, Casassa Mont, Marco, Gittler, Mickey, Pearson, Siani On the Importance of Accountability and Enforceability of Enterprise Privacy Languages http:\/\/www.w3.org\/2003\/p3p-ws\/pp\/hp1.pdf"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Buhse, Willms, Wettbewerbsstrategien im Umfeld von Darknet und Digital Rights Management \u2014 Szenarien und Erl\u00f6smodelle f\u00fcr Onlinemusik, Diss. M\u00fcnchen 2004","DOI":"10.1007\/978-3-322-81731-0"},{"key":"27_CR4","unstructured":"Dokumentation der Urheberrechtsreform-Debatte, http:\/\/www.urheberrecht.org ."},{"key":"27_CR5","unstructured":"Gre\u00df, Sebastian, Datenschutzprojekt P3P \u2014 Darstellung und Kritik, DuD 2001, S. 144."},{"key":"27_CR6","unstructured":"Schunter, Matthias, Van Herreweghen, Els, Waidner, Michael, Translating EPAL to P3P \u2014 How to keep enterprise privacy promises in sync with the actual practices http:\/\/www.w3.org\/2003\/p3p-ws\/pp\/ibm2.html"},{"key":"27_CR7","unstructured":"Thibadeau, Robert, Enabling Enterprise Privacy through Bi-Lateral Negotiation http:\/\/www.w3.org\/2003\/p3p-ws\/pp\/thibadeau.pdf"},{"key":"27_CR8","first-page":"159","volume-title":"BSI, IT-Sicherheit geht alle an! \u2014 Tagungsband zum 9","author":"M. Hansen","year":"2005","unstructured":"Hansen, Markus, M\u00f6ller, Jan, Digital Rights Management zwischen Sicherheit und informationeller Selbstbestimmung, in: BSI, IT-Sicherheit geht alle an! \u2014 Tagungsband zum 9. Deutschen IT-Sicherheitskongress, Gau-Algesheim 2005, S. 159, http:\/\/www.datenschutzzentrum.de\/vortraege\/050510_hansen-moeller_bsi.htm ."},{"key":"27_CR9","unstructured":"M\u00f6ller, Jan, FAQ P3P, http:\/\/www.datenschutzzentrum.de\/faq\/p3p.htm"},{"key":"27_CR10","unstructured":"M\u00f6ller, Jan, Stellungnahme zu juristischen Aspekten des P3P-Einsatzes in mobilen Endger\u00e4ten, http:\/\/www.datenschutzzentrum.de\/projekte\/p3p\/Gutachten_Mobilgeraete.pdf ."},{"key":"27_CR11","unstructured":"M\u00f6ller, Jan, FAQ EPAL, http:\/\/www.datenschutzzentrum.de\/faq\/epal.htm ."},{"key":"27_CR12","unstructured":"Waidner, Michael, Enabling Trust in e-Business: Research in Enterprise Privacy Technologies http:\/\/www.cacr.math.uwaterloo.ca\/conferences\/2002\/isw-eleventh\/waidner.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0027-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0027-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0027-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:16Z","timestamp":1559412496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0027-3"}},"subtitle":["Zum Einsatz von DRM jenseits der Urheberrechte"],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0027-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]}}}