{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:05:09Z","timestamp":1737522309285,"version":"3.33.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1007\/s11623-007-0220-z","type":"journal-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T22:57:22Z","timestamp":1190761042000},"page":"666-670","source":"Crossref","is-referenced-by-count":1,"title":["Service-orientierte Architekturen in virtuellen Organisationen"],"prefix":"10.1007","volume":"31","author":[{"given":"Daniel","family":"P\u00e4hler","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Ringelstein","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Schwagereit","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"220_CR1","doi-asserted-by":"crossref","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., A P3P Preference Exchange Language 1.0 (APPEL1.0), W3C, 2002.","DOI":"10.1145\/644527.644528"},{"key":"220_CR2","first-page":"343","volume":"4","author":"R. Dierstein","year":"2004","unstructured":"Dierstein, R., Sicherheit in der Informationstechnik \u2014 der Begriff IT-Sicherheit, Informatik-Spektrum 4 2004, 343\u2013353.","journal-title":"Informatik-Spektrum"},{"key":"220_CR3","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"T. R. Gruber","year":"1993","unstructured":"Gruber T. R.: A translation approach to portable ontologies. In: Knowledge Acquisition, Band 5, Nummer 2, 1993, 199\u2013220.","journal-title":"Knowledge Acquisition"},{"key":"220_CR4","unstructured":"Hallam-Baker, M., Behlendorf, B., Extended Log File Format, W3C, 1996."},{"key":"220_CR5","first-page":"63","volume-title":"POLICY\u2019 03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T., Joshi, A., A Policy Language for a Pervasive Computing Environment, in \u2018POLICY\u2019 03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks\u2019, IEEE Computer Society, Washington, DC, USA, 2003, 63\u201374."},{"key":"220_CR6","unstructured":"Moses, T (Hrsg.), XACML profile for Web Services, Working Draft 04, OASIS, 2003."},{"key":"220_CR7","unstructured":"Oestereich, B., Objektorientierte Softwareentwicklung: Analyse und Design mit der UML 2.0, Oldenburg Verlag M\u00fcnchen Berlin, 2004."},{"key":"220_CR8","unstructured":"Powers, C., Schunter, M., Enterprise Privacy Authorization Language (EPAL 1.2), W3C, 2003."},{"key":"220_CR9","unstructured":"Ringelstein, C.; Schwagereit, F., P\u00e4hler, D., Opportunities and Risks for Privacy in Service-oriented Architectures, to appear at the 5th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating the 3rd International ODRL Workshop Oct 11\u201313 2007 in Koblenz, Germany."},{"key":"220_CR10","unstructured":"Safe Harbor Privacy Principles, Issued by the U.S. Department of Commerce on July 21, 2000."},{"key":"220_CR11","first-page":"694","volume-title":"Auskunftsanspruch in verteilten Systemen","author":"T. Weichert","year":"2006","unstructured":"Weichert, T., Auskunftsanspruch in verteilten Systemen, DuD: Datenschutz und Datensicherheit 30 2006, 694\u2013699."},{"key":"220_CR12","unstructured":"Wenning, R., Schunter, M., The Platform for Privacy Preferences 1.1 (P3P1.1) Specification, W3C, 2006."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0220-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0220-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0220-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:50:46Z","timestamp":1737438646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0220-z"}},"subtitle":["Chancen und Risiken f\u00fcr den Datenschutz"],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":12,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2007,9]]}},"alternative-id":["220"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0220-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2007,9]]}}}