{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T13:31:52Z","timestamp":1649079112823},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,6,1]],"date-time":"2011-06-01T00:00:00Z","timestamp":1306886400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s11623-011-0098-7","type":"journal-article","created":{"date-parts":[[2011,6,10]],"date-time":"2011-06-10T09:13:52Z","timestamp":1307697232000},"page":"398-402","source":"Crossref","is-referenced-by-count":0,"title":["Erh\u00f6hte Sicherheit durch De-Perimetrisierung"],"prefix":"10.1007","volume":"35","author":[{"given":"Markus","family":"Gerstner","sequence":"first","affiliation":[]},{"given":"Georg","family":"Gomm","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hansen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,11]]},"reference":[{"key":"98_CR1","unstructured":"AppGate Network Security AB: appGATE \u2014 The Jericho Challenge. http:\/\/www.opengroup.org\/projects\/jericho\/uploads\/40\/8296\/5_-_JFChallenge_Oloysson-Appgate.pdf . Version: 2009, Abruf: 08.01.2011"},{"key":"98_CR2","unstructured":"Bleech, Nick: Visioning White Paper. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 02 2005, Abruf: 08.01.2011"},{"key":"98_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Studie Durchf\u00fchrungskonzept f\u00fcr Penetrationstests. November 2003"},{"key":"98_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): BSI-Standard 100-1 Managementsysteme f\u00fcr Informationssicherheit (ISMS). 2008"},{"key":"98_CR5","unstructured":"Fritsch, J\u00f6rg: No Borders. In: Linux Magazine (2008)"},{"issue":"4","key":"98_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/s11623-009-0058-7","volume":"33","author":"Stefan Gora","year":"2009","unstructured":"Gora, Stefan: Security Audits. DuD 4\/2009, S. 238\u2013246.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"98_CR7","unstructured":"G\u00fcmbel, David: jmitm2. http:\/\/www.david-guembel.de\/index.php?id=6 , Abruf: 20.12.2010"},{"key":"98_CR8","unstructured":"jdk: Damit Geheimes geheim bleibt \u2014 Information Rights Management (IRM). http:\/\/www.jdk.de\/information-rights-management-irm . Version: 2009, Abruf: 08.01.2011"},{"key":"98_CR9","unstructured":"Jericho-Forum: About Us. http:\/\/www.opengroup.org\/jericho\/about.htm , Abruf: 08.01.2011"},{"key":"98_CR10","unstructured":"Jericho-Forum: Commandments. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 2007, Abruf: 20.12.2011"},{"key":"98_CR11","unstructured":"Jericho-Forum: COA Technology Paper: Endpoint Security. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 2008, Abruf: 08.01.2011"},{"key":"98_CR12","unstructured":"Jericho-Forum: Position Paper: COA Framework. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 2008, Abruf: 08.01.2011"},{"key":"98_CR13","unstructured":"Jericho-Forum: Position Paper: Collaboration Oriented Architectures. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 2008, Abruf: 08.01.2011"},{"key":"98_CR14","unstructured":"Jericho-Forum: Technology Paper: (The need for) Inherently Secure Communications. https:\/\/www.opengroup.org\/jericho\/publications.htm . Version: 2008, Abruf: 08.01.2011"},{"key":"98_CR15","unstructured":"Siehe http:\/\/www.opengroup.org\/jericho\/"},{"key":"98_CR16","unstructured":"Golem: DRM \u2014 Digital Rights Management. http:\/\/www.golem.de\/specials\/drm , Abruf: 08.01.2011"},{"key":"98_CR17","unstructured":"Kaps, Reiko: RFC gibt reservierte IPv4-Adressen frei. http:\/\/www.heise.de\/netze\/meldung\/RFC-gibt-reservierte-IPv4-Adressenfrei-906971.html . Abruf: 07.08.2010"},{"key":"98_CR18","doi-asserted-by":"crossref","unstructured":"Kohl, J.; Neumann, Clifford B.: The Kerberos Network Authentication Service (V5). Request for Comments (RFC) 1510, September 1993.","DOI":"10.17487\/rfc1510"},{"key":"98_CR19","unstructured":"Microsoft: Microsoft: Authentication and Resource Protection in Windows 2000. http:\/\/technet.microsoft.com\/en-us\/library\/bb727080.aspx#EHAA . Version: September 2001, Abruf: 19.12.2010"},{"key":"98_CR20","unstructured":"\u2329kes\u232a\/Microsoft-Sicherheits studie 2010, in \u2329kes\u232a 2010#4, \u2329kes\u232a 2010#5, \u2329kes\u232a 2010#6"},{"key":"98_CR21","unstructured":"Miller, S. P.; Neumann, Clifford B.; Schiller, J. I.; Saltzer, J. H.: Kerberos Authentication and Authorization System. Project Athena Technical Plan, MIT, 27.10.1988."},{"key":"98_CR22","unstructured":"Pohlmann, Norbert; Reimer, Helmut: Ein Weg zu neuen IT-Sicherheitsarchitekturen. Vieweg Teubner, 2007"},{"key":"98_CR23","unstructured":"RFC 5280 \u2014 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. 2008"},{"key":"98_CR24","unstructured":"Russel, Christopher R.: Penetration Testing with dsniff. http:\/\/www.ouah.org\/dsniffintr.htm , Abruf: 08.01.2011"},{"key":"98_CR25","volume-title":"Angewandte Kryptographie","author":"B. Schneier","year":"1996","unstructured":"Schneier, Bruce: Angewandte Kryptographie. Bonn: Addison-Wesley, 1996."},{"key":"98_CR26","volume-title":"Firewalls und IT-Sicherheit: Grundlagen und Praxis sicherer Netze","author":"S. Strobel","year":"2003","unstructured":"Strobel, Stefan: Firewalls und IT-Sicherheit: Grundlagen und Praxis sicherer Netze. Bd. 3. aktualisierte und erweiterte Auflage. Heidelberg: dpunkt. Verlag, 2003","edition":"aktualisierte u"},{"key":"98_CR27","unstructured":"Verizon Business RISK Team: 2009 Data Breach Investigations Supplemental Report. http:\/\/www.verizonbusiness.com\/go\/09SuppDBIR . Version: 2009, Abruf: 08.01.2011"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0098-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0098-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0098-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0098-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T16:05:30Z","timestamp":1560269130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0098-7"}},"subtitle":["Mehrwert durch Einsatz des Jericho-Konzeptes"],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0098-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6]]}}}