{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T23:30:59Z","timestamp":1722987059501},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11623-011-0135-6","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T16:51:27Z","timestamp":1314118287000},"source":"Crossref","is-referenced-by-count":8,"title":["Verordnete Sicherheit \u2014 das Schutzprofil f\u00fcr das Smart Metering Gateway"],"prefix":"10.1007","volume":"35","author":[{"given":"Klaus J.","family":"M\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"issue":"6","key":"135_CR1","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11623-010-0107-2","volume":"34","author":"Klaus J. M\u00fcller","year":"2010","unstructured":"M\u00fcller, Klaus J.: Gewinnung von Verhaltensprofilen am intelligenten Stromz\u00e4hler. DuD 08\/2011, S. 359\u2013364. \n                    http:\/\/www.secorvo.de\/publikationen\/verhaltensprofile-smartmeter-mueller-2010.pdf","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"135_CR2","unstructured":"Lastenheft Multi Utility Communication (MUC), 2009. \n                    http:\/\/www.vde.com\/de\/fnn\/arbeitsgebiete\/messwesen\/documents\/fnn_lh-muc_1-0_2009-08-05.pdf"},{"key":"135_CR3","unstructured":"Guidelines for Smart Grid Cyber Security (NISTIR 7628), 2010. \n                    http:\/\/csrc.nist.gov\/publications\/PubsNISTIRs.html#NIST-IR-7628"},{"key":"135_CR4","unstructured":"NIST SP 800-40: Creating a Patch and Vulnerability Management Program, 2005. \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-40-Ver2\/SP800-40v2.pdf"},{"key":"135_CR5","unstructured":"ISO27002, 13.2 Umgang mit Informationssicherheitsvorf\u00e4llen und Verbesserungen, 2008."},{"key":"135_CR6","unstructured":"BSI: IT-Grundschutz-Kataloge, 2009, B 1.8 Behandlung von Sicherheitsvorf\u00e4llen, \n                    https:\/\/www.bsi.bund.de\/ContentBSI\/grundschutz\/kataloge\/baust\/b01\/b01008.html\n                    \n                  , B 1.14 Patch- und \u00c4nderungsmanagement, \n                    https:\/\/www.bsi.bund.de\/ContentBSI\/grundschutz\/kataloge\/baust\/b01\/b01014.html"},{"key":"135_CR7","unstructured":"Stellungnahme des Unabh\u00e4ngigen Landeszentrums f\u00fcr Datenschutz Schleswig-Holstein (ULD) vom 10.06.2011 zum Gesetzentwurf der Bundes regierung eines Gesetzes zur Neuregelung energiewirtschaftlicher Vorschriften, 2011 \n                    https:\/\/www.datenschutzzentrum.de\/smartmeter\/20110615-smartmeterregelung.htm"},{"key":"135_CR8","unstructured":"Secorvo: Unqualifiziert qualifiziert, Secorvo Security News, Juni 2010, \n                    http:\/\/www.secorvo.de\/security-news\/secorvo-ssn1006.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0135-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0135-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0135-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0135-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:04Z","timestamp":1559413264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0135-6"}},"subtitle":["Eine Bewertung des neuen Schutzprofils"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["135"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0135-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]},"article-number":"547"}}