{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T09:05:13Z","timestamp":1649149513852},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s11623-012-0092-8","type":"journal-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T04:49:18Z","timestamp":1334638158000},"page":"241-245","source":"Crossref","is-referenced-by-count":0,"title":["Ein praktischer Weg zur Sicherheit von Eigenentwicklungen"],"prefix":"10.1007","volume":"36","author":[{"given":"Amir","family":"Alsbih","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,18]]},"reference":[{"key":"92_CR1","doi-asserted-by":"crossref","unstructured":"Peterson, Gunnar. The Economics of Finding and Fixing Vulnerabilities in Distributed Systems. 2008. Workshop on Quality of Protection.","DOI":"10.1145\/1456362.1456363"},{"key":"92_CR2","unstructured":"PricewaterhouseCoopers LLP. Information Security Breaches Survey 2010. 2010."},{"key":"92_CR3","unstructured":"Ernst & Young. Data loss prevention: Keeping your sensitive data out of the public domain. 2011. Insights on IT risk."},{"key":"92_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Glossar und Begriffsdefinitionen. [Online] \n                    https:\/\/www.bsi.bund.de\n                    \n                  ."},{"key":"92_CR5","unstructured":"Custom Solutions Group (CIO). A CISO\u2019s Guide to Application Security. 2009."},{"key":"92_CR6","unstructured":"Microsoft Corporation. Microsoft Security Development Lifecycle. [Online] 2011. \n                    http:\/\/www.microsoft.com\/security\/sdl\n                    \n                  ."},{"key":"92_CR7","unstructured":"Swiderski, Frank und Snyder, Window. Threat modeling. s.l.: Microsoft Press, 2004. 0-7356-1991-3."},{"key":"92_CR8","unstructured":"Microsoft Corporation. Server- und Dom\u00e4nenisolierung mithilfe von IPSec und Gruppenrichtlinien. [Online] 2005. \n                    http:\/\/www.microsoft.com\/germany\/technet\/datenbank\/articles\/900351.mspx#EEC\n                    \n                  ."},{"issue":"10","key":"92_CR9","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s11623-006-0159-5","volume":"30","author":"Markus Schumacher","year":"2006","unstructured":"Schumacher, Dr. Markus und Wiegenstein, Andreas. Sichere Web-Anwendungen: Vor- und Nachteile beim Einsatz von Sicherheitstestwerkzeugen. Datenschutz und Datensicherheit. 2006, 30.","journal-title":"Datenschutz und Datensicherheit - DuD"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0092-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0092-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0092-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0092-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:21:07Z","timestamp":1559413267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0092-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["92"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0092-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}