{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:17:43Z","timestamp":1648649863085},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2006,5,1]],"date-time":"2006-05-01T00:00:00Z","timestamp":1146441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,5]]},"DOI":"10.1007\/s11623-006-0091-8","type":"journal-article","created":{"date-parts":[[2006,6,24]],"date-time":"2006-06-24T04:33:47Z","timestamp":1151123627000},"page":"304-307","source":"Crossref","is-referenced-by-count":2,"title":["Protokollierung bei Identit\u00e4tsmanagementsystemen"],"prefix":"10.1007","volume":"30","author":[{"given":"Martin","family":"Meints","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","unstructured":"MHB05 Meints, M., Hansen, M. Bauer, M. (Hrsg.), FIDIS Deliverable D3.1 \u2014 Overview on Identity Management Systems, Franfurt a.M. 2005. Download siehe http:\/\/www.fidis.net\/487.0.html"},{"key":"91_CR2","unstructured":"HB05 Hildebrandt, M., Backhouse, J. (Hrsg.), FIDIS Deliverable D7.2 \u2014 Descriptive Analysis and Inventory of Profiling Practice, Frankfurt a. M. 2005. Download siehe http:\/\/www.fidis.net\/487.0.html"},{"key":"91_CR3","unstructured":"IPTS03 Institute for Prospective Technological Studies (IPTS), Identity Management Systems: Identification and Comparison Study, Sevillia 2005. Download siehe http:\/\/www.datenschutzzentrum.de\/projekte\/idmanage\/study.htm"},{"key":"91_CR4","unstructured":"ULD06 Unabh\u00e4ngiges Landeszentrum f\u00fcr Datenschutz Schleswig-Holstein (ULD), Scoringsysteme zur Beurteilung der Kreditw\u00fcrdigkeit \u2014 Chancen und Risiken f\u00fcr Verbraucher, Berlin 2006, S. 34. Download siehe http:\/\/www.bmelv.de\/cln_045\/nn_752314\/SharedDocs\/downloads\/02-Verbraucherschutz\/Finanzdienstleistungen\/scoring,templateId=raw,property=publicationFile.pdf\/scoring.pdf"},{"key":"91_CR5","unstructured":"Br\u00fc03 Br\u00fcckner, L. Aktiver Datenschutz mit Data Journals, DuD 5\/2003."},{"key":"91_CR6","unstructured":"Br\u00fc05 Br\u00fcckner, L., Voss, M., \u2018MozPETs \u2014 a privacy enhanced Web Browser\u2019, Procedings of the Third Annual Conference on Privacy, Security and Trust (PST05). St. Andrews, New Brunswick, Canada; October 12\u201314, 2005. Download siehe http:\/\/www.ito.tu-darmstadt.de\/projects\/prima\/index_de_html"},{"key":"91_CR7","unstructured":"FHAH05 Fischer-H\u00fcbner, S., Andersson, C., Holleboom, T., PRIME Deliverable D14.1.a, Framework Document VI, St.-Stevens-Woluwe 2005. Download siehe http:\/\/www.prime-project.eu.org\/public\/prime_products\/deliverables\/fmwk\/"},{"key":"91_CR8","unstructured":"Pet05 Pettersson, J. S., PRIME Deliverable D06.1.c HCI guidance and proposal, St.-Stevens-Woluwe 2005. Download siehe http:\/\/www.prime-project.eu.org\/public\/prime_products\/deliverables\/arch\/"},{"key":"91_CR9","unstructured":"KaHu02 Karjoth, G., Hunter, M., \u2018A Privacy Model for Enterprises\u2019, IBM Research, Z\u00fcrich, 15th IEEE Computer Foundations Workshop, Keltic Lodge, Canada 2002."},{"key":"91_CR10","volume-title":"Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforcable Tracing Services","author":"M. Casassa Mont","year":"2003","unstructured":"CMPB03 Casassa Mont, M., Pearson, S., Bramhall, P., Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforcable Tracing Services, HP Laboratories Bristol, Bristol 2003. Download siehe http:\/\/www.hpl.hp.com\/techreports\/2003\/HPL-2003-49.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0091-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0091-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0091-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:17Z","timestamp":1559412497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0091-8"}},"subtitle":["Anforderungen und L\u00f6sungsans\u00e4tze"],"short-title":[],"issued":{"date-parts":[[2006,5]]},"references-count":10,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,5]]}},"alternative-id":["91"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0091-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5]]}}}