{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T11:54:29Z","timestamp":1650369269100},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s11623-006-0139-9","type":"journal-article","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T08:08:30Z","timestamp":1158566910000},"page":"543-547","source":"Crossref","is-referenced-by-count":5,"title":["Digitale Identit\u00e4ten \u2014 \u00dcberblick und aktuelle Trends"],"prefix":"10.1007","volume":"30","author":[{"given":"Marit","family":"Hansen","sequence":"first","affiliation":[]},{"given":"Martin","family":"Meints","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"139_CR1","doi-asserted-by":"crossref","unstructured":"Aleman-Meza, B., Nagarajan, M., Ramakrishnan, C., Ding, L., Kolari, P., Sheth, A.P., Arpinar, I.B., Joshi, A., Finin, T., \u2019semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection\u2019, WWW 2006, 15th International World Wide Web Conference, 2006.","DOI":"10.1145\/1135777.1135838"},{"key":"139_CR2","unstructured":"Bauer, M., Meints, M., Hansen, M. (Hrsg.), FIDIS Deliverable D3.1 \u2014 Structured Overview on Prototypes and Concepts of Identity Management Systems, Frankfurt a.M. 2005. Download: http:\/\/www.fidis.net\/486.0.html ."},{"key":"139_CR3","unstructured":"Camenisch, J., Lysyanskaya, A., \u2018Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation\u2019, Advances in Cryptology \u2014 EUROCRYPT 2001, LNCS Vol. 2045, 93\u2013118. Springer Verlag, 2001."},{"key":"139_CR4","unstructured":"Cameron, K., The Laws of Identity, Mai 2005. Download: http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOf Identity.pdf ."},{"key":"139_CR5","unstructured":"Casassa Mont, M., Thyne, R., Chan, K., Bramhall, P., Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises, HP Technical Report, HPL-2005-110, Juni 2005."},{"key":"139_CR6","unstructured":"Hansen, M., Krasemann, H., Rost, M., Genghini, R., Identity Management Systems (IMS): Identification and Comparison, Studie f\u00fcr das Institute for Prospective Technological Studies, Joint Research Centre Seville, Spanien, September 2003; http:\/\/www.datenschutzzentrum.de\/idmanage\/study\/ICPP_SNG_IMSStudy.pdf ."},{"key":"139_CR7","unstructured":"Hildebrandt, M., \u2018Profiling \u2014 From data to knowledge\u2019, in diesem Heft."},{"key":"139_CR8","unstructured":"Kent, S.T., Millett, L.I. (Hrsg.), Who Goes There? Authentication Through the Lens of Privacy, Washington, D.C. 2003. Download: http:\/\/www7.nationalacademies.org\/cstb\/pub_authentication.html ."},{"key":"139_CR9","unstructured":"Koops, B.-J., Leenes, R., \u2018ID Theft, ID Fraud and\/or ID-related Crime \u2014 Definitions matter\u2019, in diesem Heft."},{"key":"139_CR10","unstructured":"Leenes, R. (Hrsg.), FIDIS Deliverable D5.2b \u2014 ID-related Crime: Towards a Common Ground for Interdisciplinary Research, Frankfurt a.M. 2006. Download: http:\/\/www.fidis.net\/487.0.html ."},{"key":"139_CR11","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/s11623-006-0091-8","volume":"5","author":"M. Meints","year":"2006","unstructured":"Meints, M., \u2019Protokollierung bei Identit\u00e4tsmanagementsystemen\u2019, DuD 5\/2006, 304\u2013307, Wiesbaden 2006.","journal-title":"DuD"},{"key":"139_CR12","unstructured":"Pfitzmann, A., Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems, Script, Dresden 2005. Download: http:\/\/dud.inf.tu-dresden.de\/~pfitza\/SecCryptI_II.pdf"},{"key":"139_CR13","unstructured":"Pfitzmann, A., Hansen, M., Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management \u2014 A Consolidated Proposal for Terminology, Working Paper v0.28, Mai 2006, http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml ."},{"key":"139_CR14","unstructured":"Rangol, N., \u2018Datenhandel \u2014 \u201eGuten Tag, welchen Score-Wert haben Sie?\u201c\u2019, ARD-Ratgeber, 13.06.2006. Download: http:\/\/www.ard.de\/ratgeber\/special\/datenhandel\/-\/id=322978\/nid=322978\/did=320280\/5frl6d\/ ."},{"key":"139_CR15","unstructured":"Royer, D., Rannenberg, K., Mobilit\u00e4t, mobile Technologie und Identit\u00e4t, in diesem Heft."},{"key":"139_CR16","unstructured":"Schmid, G., Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001\/2098(INI)), Juli 2001."},{"key":"139_CR17","unstructured":"Weichert, T., Scoringsysteme zur Beurteilung der Kreditw\u00fcrdigkeit \u2014 Chancen und Risiken f\u00fcr Verbraucher, Februar 2006. Download: http:\/\/www.datenschutzzentrum.de\/scoring\/ ."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0139-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0139-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0139-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:18Z","timestamp":1559412498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0139-9"}},"subtitle":["Identity-Lifecycle, Authentisierung und Identit\u00e4tsmanagement"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":17,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0139-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]}}}