{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T11:40:36Z","timestamp":1648640436526},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11623-011-0138-3","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T12:51:27Z","timestamp":1314103887000},"source":"Crossref","is-referenced-by-count":4,"title":["20 Jahre IT-Sicherheitszertifizierung"],"prefix":"10.1007","volume":"35","author":[{"given":"Heinrich","family":"Kersten","sequence":"first","affiliation":[]},{"given":"Klaus-Werner","family":"Schr\u00f6der","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"key":"138_CR1","unstructured":"Anwendungshinweise und Inter pretationen zum Schema, Bundesamt f\u00fcr Sicherheit in der Informationstechnik"},{"key":"138_CR2","unstructured":"Gesetz \u00fcber die Errichtung des Bundesamtes f\u00fcr Sicherheit in der In formationstechnik (BSI-Errichtungs ge setz \u2014 BSIG) vom 17. Dezember 1990, BGBl. I, S. 2834"},{"key":"138_CR3","unstructured":"Gesetz zur St\u00e4rkung der Sicher heit in der Informationstechnik des Bundes vom 14. August 2009, BGBl. I, S. 2821"},{"key":"138_CR4","unstructured":"Common Criteria for Information Technology Security Evaluation, \n                    www.commoncriteriaportal.org"},{"key":"138_CR5","unstructured":"IT-Evaluationshandbuch. Hand buch f\u00fcr die Pr\u00fcfung der Sicherheit von Systemen der Informationstechnik (IT), 22. Februar 1990"},{"key":"138_CR6","unstructured":"Information Technology Security Evaluation Criteria. Provisional Harmo nised Criteria, Version 1.2, 28 June 1991, ISBN 92-826-3004-8; deutsche Fassung: ISBN 92-826-3003-X"},{"key":"138_CR7","unstructured":"Information Technology Security Evaluation Manual. Provisional Harmo nised Methodology, Version 1.0, 10 September 1993, ISBN 92-826-7087-2; deutsche Fassung: ISBN 92-826-7078-2"},{"key":"138_CR8","unstructured":"IT-Sicherheitskriterien. Kriterien f\u00fcr die Bewertung der Sicherheit von Systemen der Informationstechnik (IT), 11. Januar 1989"},{"key":"138_CR9","unstructured":"ITSEC: Joint Interpretation Library, Version 1.0: 1996, Version 2.0: 1998"},{"key":"138_CR10","unstructured":"Melton, Devaney, Lykov, Shein, Piskarev, Hunteman, Prommel, Rothfuss: The use of Information Technology Security Assessment Criteria to protect specialised computer systems, Konferenzbeitrag NISSC\u2019 97"},{"key":"138_CR11","unstructured":"(US) Department of Defense, Trusted Computer System Evaluation Criteria, CSC-STD-001-83 vom 15.08.1983; eine zweite Fassung DoD 5200.28-STD erschien am 26.12.1985."},{"key":"138_CR12","unstructured":"http:\/\/de.wikipedia.org\/wiki\/Zertifizierung"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0138-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0138-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0138-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0138-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:21:04Z","timestamp":1559398864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0138-3"}},"subtitle":["Teil 1: Die Anf\u00e4nge"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["138"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0138-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]},"article-number":"565"}}