{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:16:32Z","timestamp":1648772192931},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11623-011-0137-4","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T12:51:27Z","timestamp":1314103887000},"source":"Crossref","is-referenced-by-count":2,"title":["Datenschutz im Fahrzeug"],"prefix":"10.1007","volume":"35","author":[{"given":"Naim","family":"Asaj","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"key":"137_CR1","unstructured":"Technicity, \u201cWir werden das Auto zum Bestandteil der Cloud machen.\u201d, abrufbar unter http:\/\/www.daimler-technicity.de\/bharat-balasubramanian\/ , 01.06.2011"},{"key":"137_CR2","unstructured":"Technicity, \u201cALWAYS ON\u201d, abrufbar unter http:\/\/www.daimler-technicity.de\/alwayson , 01.06.2011"},{"key":"137_CR3","unstructured":"Badst\u00fcbner, J., Der gl\u00e4serne Autofahrer. Automobil Industrie \u2014 August 2008."},{"key":"137_CR4","unstructured":"Rouf, I., et al., Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. USENIX Security Symposium, USENIX Association, 2010, 323\u2013338"},{"key":"137_CR5","unstructured":"Rosengart F., BigBrother Awards. Kategorie Technik www.bigbrotherawards.de\/2007\/.tec , 05.05.2011"},{"key":"137_CR6","first-page":"607","volume":"10","author":"J. J. Borking","year":"2001","unstructured":"Borking, John J.: Privacy-Enhancing Technologies (PET), DuD 10\/2001, 607\u2013615.","journal-title":"DuD"},{"key":"137_CR7","unstructured":"van Blarkom, G.W., Borking, J.J., Olk, J.G.E. \u201cHandbook of Privacy and Privacy-Enhancing Technologies.\u201d (The Case of Intelligent Software Agents) 2003 ISBN 90-74087-33-7"},{"key":"137_CR8","doi-asserted-by":"crossref","unstructured":"Chaum, David: Untraceable Electronic Mail, Return Adresses and Digital Pseudonyms, Communications of the ACM 24\/2, 1981.","DOI":"10.1145\/358549.358563"},{"key":"137_CR9","unstructured":"Baryam, Y. \u201cDynamics Of Complex Systems\u201d (Studies in Nonlinearity) Westview Press; First Edition edition, 1997"},{"key":"137_CR10","doi-asserted-by":"crossref","unstructured":"Duri, S., et al., Framework for security and privacy in automotive telematics. Proceedings of the 2nd international workshop on Mobile commerce, ACM, 2002, 25\u201332","DOI":"10.1145\/570705.570711"},{"key":"137_CR11","volume-title":"Workshop on Requirements for Mobile Privacy & Security","author":"A. Held","year":"2002","unstructured":"Held, A. & Kroh, R., IT-security and privacy for telematics services, in Workshop on Requirements for Mobile Privacy & Security, University of London, UK, September 2002."},{"key":"137_CR12","doi-asserted-by":"crossref","unstructured":"Ma, Z.; Kargl, F. & Weber, M. A location privacy metric for V2X communication systems Proceedings of the 32nd international conference on Sarnoff symposium, IEEE Press, 2009, 213\u2013218","DOI":"10.1109\/SARNOF.2009.4850318"},{"key":"137_CR13","unstructured":"Bell, D. Elliott; LaPadula, Leonard J.: Secure Computer Systems. Mathematical Foundations, MITRE Corporation, 1973"},{"key":"137_CR14","unstructured":"Preciosa \u2014 Privacy Enabled Capability In Co-Operative Systems and Safety Applications, http:\/\/www.preciosa-project.org , 05.05.2011"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0137-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0137-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0137-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0137-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T04:52:54Z","timestamp":1560487974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0137-4"}},"subtitle":["\u00dcbersicht, Aspekte und erste L\u00f6sungsans\u00e4tze"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["137"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0137-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]},"article-number":"558"}}