{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T19:53:28Z","timestamp":1674071608549},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1007\/s11623-011-0079-x","type":"journal-article","created":{"date-parts":[[2011,5,20]],"date-time":"2011-05-20T19:58:31Z","timestamp":1305921511000},"page":"322-328","source":"Crossref","is-referenced-by-count":1,"title":["Eine Gef\u00e4hrdungsanalyse von Private Clouds"],"prefix":"10.1007","volume":"35","author":[{"given":"Isabel","family":"M\u00fcnch","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Doubrava","sequence":"additional","affiliation":[]},{"given":"Alex Didier","family":"Essoh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"79_CR1","unstructured":"BITKOM, Cloud Computing mit extrem starkem Wachstum, 6.10.2010, \n                    http:\/\/www.bitkom.org\/de\/presse\/66442_65427.aspx"},{"key":"79_CR2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), IT-Grundschutz-Kataloge, \n                    https:\/\/www.bsi.bund.de\/grundschutz\/kataloge"},{"key":"79_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Mindest-Sicherheitsanforderungen an Cloud-Computing-Anbieter, Entwurf, September 2010, \n                    https:\/\/www.bsi.bund.de\/"},{"key":"79_CR4","unstructured":"Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Dezember 2009, \n                    http:\/\/www.cloudsecurityalliance.org\/csaguide.pdf"},{"key":"79_CR5","unstructured":"ENISA, Cloud Computing: Benefits, risks and recommendations for information security, November 2009, \n                    http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloudcomputing-risk-assessment\/at_download\/fullReport"},{"key":"79_CR6","unstructured":"Cisco, Netapp, VMware, Designing Secure Multi-Tenancy into Virtualized Data Centers, Dezember 2009, \n                    http:\/\/www.vmware.com\/files\/pdf\/partners\/netapp\/vmware-netapp-securecldg-en.pdf"},{"key":"79_CR7","unstructured":"Webhost hack wipes out data for 100,000 sites, Juni 2009 \n                    http:\/\/www.theregister.co.uk\/2009\/06\/08\/webhost_attack\/"},{"key":"79_CR8","unstructured":"VCE, Vblock Infrastructure Platform Architecture, Dezember 2010 \n                    http:\/\/www.vce.com\/pdf\/solutions\/vce-vblock-infrastructurereference-architecture.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0079-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0079-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0079-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0079-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:02Z","timestamp":1559413262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0079-x"}},"subtitle":["Sichere Virtualisierung als Grundlage f\u00fcr sichere Private Cloud-Umgebungen"],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0079-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}