{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:15:41Z","timestamp":1649117741498},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2006,5,1]],"date-time":"2006-05-01T00:00:00Z","timestamp":1146441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,5]]},"DOI":"10.1007\/s11623-006-0084-7","type":"journal-article","created":{"date-parts":[[2006,6,24]],"date-time":"2006-06-24T00:33:47Z","timestamp":1151109227000},"page":"281-284","source":"Crossref","is-referenced-by-count":1,"title":["Revisionssichere Protokollierung in Standardbetriebssystemen"],"prefix":"10.1007","volume":"30","author":[{"given":"Stephen D.","family":"Wolthusen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"84_CR1","unstructured":"AHN, G.-J., AND SANDHU, R. S. The RSL99 Language for Role-Based Separation of Duty Constraints. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (RBAC 1999) (Fairfax, VA, USA, Oct. 1999), ACM Press, pp. 43\u201354."},{"key":"84_CR2","unstructured":"ARNOLD, M., SCHMUCKER, M., AND WOLTHUSEN, S. D. Techniques and Applications of Digital Watermarking and Content Protection. The Artech House Computer Security Series. Artech House, Norwood, MA, USA, 2003."},{"key":"84_CR3","unstructured":"BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (Bolton Landing, NY, USA, Oct. 2003), ACM Press, pp. 164\u2013177."},{"key":"84_CR4","volume-title":"Netzwerksicherheit","author":"C. Busch","year":"2002","unstructured":"Busch, C., and Wolthusen, S. D. Netzwerksicherheit. Spektrum Akademischer Verlag, Heidelberg, 2002."},{"key":"84_CR5","unstructured":"COMMON CRITERIA IMPLEMENTATION AND MAINTENANCE BOARD. Common Criteria for Information Technology Security Evaluation: Part 2: Security Functional Components. Common Criteria Implementation and Maintenance Board, Cheltenham, Glos, UK, 2005. Version 3.0, Revision 2, CCMB document 2005-07-002."},{"key":"84_CR6","unstructured":"FERRAIOLO, D. F., KUHN, D. R., AND CHANDRAMOULI, R. Role-Based Access Control. The Artech House Computer Security Series. Artech House, Norwood, MA, USA, 2003."},{"issue":"1","key":"84_CR7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/602421.602436","volume":"46","author":"R. T. Mercuri","year":"2003","unstructured":"Mercuri, R. T. On Auditing Audit Trails. Communications of the Association for Computing Machinery 46, 1 (Jan. 2003), 17\u201320.","journal-title":"Communications of the Association for Computing Machinery"},{"key":"84_CR8","doi-asserted-by":"crossref","unstructured":"PICCIOTTO, J. The Design of an Effective Auditing Subsystem. In Proceedings of the 1987 IEEE Symposium on Security and Privacy (Oakland, CA, USA, Apr. 1987), IEEE Press, pp. 13\u201322.","DOI":"10.1109\/SP.1987.10015"},{"issue":"2","key":"84_CR9","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B. Schneier","year":"1999","unstructured":"Schneier, B., and Kelsey, J. Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security 2, 2 (May 1999), 159\u2013176.","journal-title":"ACM Transactions on Information and System Security"},{"key":"84_CR10","unstructured":"UNITED STATES DEPARTMENT OF DEFENSE DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (1985)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0084-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0084-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0084-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:17Z","timestamp":1559398097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0084-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["84"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0084-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5]]}}}