{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T21:54:49Z","timestamp":1648850089740},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,5,27]],"date-time":"2012-05-27T00:00:00Z","timestamp":1338076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11623-012-0149-8","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T05:04:09Z","timestamp":1348635849000},"page":"407-412","source":"Crossref","is-referenced-by-count":1,"title":["Vertraulichkeit und Integrit\u00e4t von Daten und IT-Systemen im Cloud-Zeitalter"],"prefix":"10.1007","volume":"36","author":[{"given":"Marit","family":"Hansen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,27]]},"reference":[{"key":"149_CR1","unstructured":"AK Technik und AK Medien der Konferenz der Datenschutzbeauftragten des Bundes und der L\u00e4nder (2011) Orientierungshilfe \u2014 Cloud Computing. Version 1.0, Stand 26.09.2011, www.datenschutz-bayern.de\/technik\/orient\/oh_cloud.pdf"},{"issue":"5","key":"149_CR2","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11623-010-0096-1","volume":"34","author":"M. Bedner","year":"2010","unstructured":"Bedner, M. \/ Ackermann, T. (2010) Schutzziele der IT-Sicherheit. DuD 34(5):323\u2013328","journal-title":"DuD"},{"key":"149_CR3","doi-asserted-by":"crossref","unstructured":"Bessani, A. et al. (2011) DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. 6th ACM SIG OPS\/EuroSys European Systems Conference (EuroSys\u2019 11), S. 31\u201345","DOI":"10.1145\/1966445.1966449"},{"key":"149_CR4","doi-asserted-by":"crossref","unstructured":"Birk, D. \/ Wegener, C. (2011) Technical Issues of Forensic Investigations in Cloud Computing Environments. IEEE 6th Int. Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), S. 1\u201310","DOI":"10.1109\/SADFE.2011.17"},{"issue":"1","key":"149_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1524\/itit.2011.0622","volume":"53","author":"K. Borcea-Pfitzmann","year":"2011","unstructured":"Borcea-Pfitzmann, K. \/ Pfitzmann, A. \/ Berg, M. (2011) Privacy 3.0:= data minimization + user control + contextual integrity. it \u2014 Information Technology 53(1):34\u201340","journal-title":"it \u2014 Information Technology"},{"key":"149_CR6","unstructured":"Bowden, C. (2011) Privacy and surveillance on the Internet \u2014 What happened, and what to expect next... Pr\u00e4sentation vom 20.09.2011, http:\/\/wolnyinternet.panoptykon.org\/sites\/default\/files\/internet_surveillance_caspar_bowden.pdf"},{"issue":"9","key":"149_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1151030.1151055","volume":"49","author":"J. Buchmann","year":"2006","unstructured":"Buchmann, J. \/ May, A. \/ Vollmer, U. (2006) Perspectives for Cryptographic Long-Term Security. CACM 49(9): 50\u201356","journal-title":"CACM"},{"key":"149_CR8","unstructured":"Bugiel, S. et al. (2011) Twin Clouds: An Architecture for Secure Cloud Computing. Workshop on Cryptography and Security in Clouds (CSC\u201911), www. hgi.rub.de\/hgi\/publikationen\/SSBN11\/"},{"key":"149_CR9","unstructured":"BSI (2011) Eckpunktepapier Sicherheitsempfehlungen f\u00fcr Cloud Computing Anbieter. 10.05.2011, www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Mindestanforderungen\/Eckpunktepapier-Sicherheitsempfehlungen-CloudComputing-Anbieter.pdf"},{"key":"149_CR10","unstructured":"BVerfG (1983) Urteil vom 15.12.1983, Az. 1 BvR 209, 269, 362, 420, 440, 484\/83"},{"key":"149_CR11","unstructured":"BVerfG (2008) Urteil vom 27.02.2008, 1 BvR 370\/07, Abs. 1\u2013333"},{"key":"149_CR12","doi-asserted-by":"crossref","unstructured":"Chow, R. et al. (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. 2009 ACM Workshop on Cloud Computing Security (CCSW\u2019 09), S. 85\u201390","DOI":"10.1145\/1655008.1655020"},{"key":"149_CR13","unstructured":"Cloud Security Alliance (2010) Cloud Audit: Automated Audit, Assertion, Assessment, and Assurance. http:\/\/cloudaudit.org\/CloudAudit\/Downloads.html"},{"key":"149_CR14","unstructured":"Common Criteria for Information Technology Security Evaluation, Part 2: Security functional components, Version 2.1 (1999) CCIMB-99-032, ISO\/IEC 15408:1999, www.commoncriteriaportal.org\/files\/ccfiles\/ccpart2v21.pdf"},{"key":"149_CR15","unstructured":"Curry, Sam et al. (2010) Infrastructure Security: Getting to the Bottom of Compliance in the Cloud. RSA Security Brief, March 2010"},{"issue":"12","key":"149_CR16","first-page":"704","volume":"24","author":"H. Federrath","year":"2000","unstructured":"Federrath, H. \/ Pfitzmann, A. (2000) Gliederung und Systematisierung von Schutzzielen in IT-Systemen. DuD 24(12):704\u2013710","journal-title":"DuD"},{"key":"149_CR17","unstructured":"Foresman, C. (2012) Apple holds the master decryption key when it comes to iCloud security, privacy. Ars technica, 03.04.2012, http:\/\/arstechnica.com\/apple\/news\/2012\/04\/apple-holds-the-master-key-when-it-comes-to-icloud-security-privacy.ars"},{"key":"149_CR18","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-20898-0_15","volume-title":"The Future Internet","author":"R\u00fcdiger Glott","year":"2011","unstructured":"Glott, R\u00fcdiger et al. (2011) Trustworthy Clouds underpinning the Future Internet. In: Future Internet Assembly, LNCS 6656, Springer, S. 209\u2013221"},{"key":"149_CR19","unstructured":"Goodman, A. (2010) Gagged for 6 Years, Nick Merrill Speaks Out on Landmark Court Struggle Against FBI\u2019s National Security Letters. Interview, Democracy Now!, 11.08.2010, www.democracynow.org\/2010\/8\/11\/gagged_for_6_years_nick_merrill"},{"key":"149_CR20","unstructured":"Heckert, M. (2011) Wie ein Handy-Fan von Wolke Sieben fiel. Aachener Zeitung vom 01.02.2011, www.az-web.de\/sixcms\/detail.php?template=az_detail&id=1533902"},{"key":"149_CR21","doi-asserted-by":"crossref","unstructured":"Hudic, A. et al. (2012) Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Communication Networks and Distributed Systems 1(3\/4)","DOI":"10.1108\/17427371311315743"},{"key":"149_CR22","unstructured":"Kaliski, B.S. \/ Pauley, W. (2010) Toward Risk Assessment as a Service in Cloud Environments. 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u2019 10)"},{"key":"149_CR23","unstructured":"Ko, S.Y. \/ Jeon, K. \/ Morales, R. (2011) The HybrEx Model for Confidentiality and Privacy in Cloud Computing. 3rd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud\u2019 11)"},{"key":"149_CR24","doi-asserted-by":"crossref","unstructured":"Lauter, K. \/ Naehrig, M. \/ Vaikuntanathan, V. (2011) Can Homomorphic Encryption be Practical? 3rd ACM Workshop on Cloud Computing Security (CCSW\u201911)","DOI":"10.1145\/2046660.2046682"},{"key":"149_CR25","unstructured":"Markoff, J. (2008): Internet Traffic Begins to Bypass the U.S. The New York Times, 30.08.2008, www.nytimes.com\/2008\/08\/30\/business\/30pipes.html"},{"key":"149_CR26","unstructured":"Meyer, C. et al. (2011) Sec 2 \u2014 Ein mobiles Nutzer-kontrolliertes Sicherheitskonzept f\u00fcr Cloud-Storage. D.A.CH Security 2011, S. 285\u2013295"},{"key":"149_CR27","doi-asserted-by":"crossref","unstructured":"Neisse, R. \/ Holling, D. \/ Pretschner, A. (2011) Implementing Trust in Cloud Infrastructures. 2011 11th IEEE \/ ACM Int. Symposium on Cluster, Cloud and Grid Computing (CCGRID\u2019 11)","DOI":"10.1109\/CCGrid.2011.35"},{"issue":"5","key":"149_CR28","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"Nissenbaum, H. (1998) Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17(5):559\u2013596","journal-title":"Law and Philosophy"},{"issue":"5","key":"149_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11623-011-0078-y","volume":"35","author":"S. Paulus","year":"2011","unstructured":"Paulus, S. (2011) Standards f\u00fcr Trusted Clouds \u2014 Anforderungen an Standards und aktuelle Entwicklungen. DuD 35(5):317\u2013321","journal-title":"DuD"},{"key":"149_CR30","doi-asserted-by":"crossref","unstructured":"Puttaswamy, K.P.N. \/ Kruegel, C. \/ Zhao, B.Y. (2011) Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications. 2nd ACM Symposium on Cloud Computing (SOCC\u2019 11)","DOI":"10.1145\/2038916.2038926"},{"key":"149_CR31","unstructured":"Rath, M. \/ Rothe, B. (2012) Vorsicht vor Clouds im Ausland. Computerwoche, 07.02.2012, www.computerwoche.de\/2504448"},{"key":"149_CR32","doi-asserted-by":"crossref","unstructured":"Rocha, F. \/ Correia, M. (2011) Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud. 1st Int. Workshop on Dependability of Cloud, Data Centers and Virtual Computing Environments (DCDV)","DOI":"10.1109\/DSNW.2011.5958798"},{"issue":"6","key":"149_CR33","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s11623-009-0072-9","volume":"33","author":"M. Rost","year":"2009","unstructured":"Rost, M. \/ Pfitzmann, A. (2009) Datenschutz-Schutzziele \u2014 revisited. DuD 33(6):353\u2013358","journal-title":"DuD"},{"key":"149_CR34","unstructured":"Smart, N. (Hrsg.) (2011) ECRYPT II Yearly Report on Algorithms and Keysizes (2010\u20132011), www.ecrypt.eu.org\/documents\/D.SPA.17.pdf"},{"key":"149_CR35","doi-asserted-by":"crossref","unstructured":"Somorovsky, J. (2011) All your clouds are belong to us: Security analysis of cloud management interfaces. 3rd ACM Workshop on Cloud Computing Security (CCSW\u2019 11)","DOI":"10.1145\/2046660.2046664"},{"key":"149_CR36","unstructured":"Strauch, S. et al. (2012) Cloud Data Patterns for Confidentiality. 2nd Int. Conference on Cloud Computing and Service Science (CLOSER 2012)"},{"key":"149_CR37","unstructured":"ULD (2011) Inanspruchnahme des Patriot Acts und anderer US-rechtlicher Regelungen zur Beschaffung von personenbezogenen Daten aus dem Raum der Europ\u00e4ischen Union durch US-Beh\u00f6rden. Positionspapier, 15.11.2011, www.datenschutzzentrum.de\/internationales\/20111115-patriot-act.html"},{"key":"149_CR38","unstructured":"Whittaker, Z. (2011) Microsoft admits Patriot Act can access EU-based cloud data. ZDNet, 28.06.2011, www.zdnet.com\/blog\/igeneration\/microsoft-admits-patriot-act-can-access-eu-based-cloud-data\/11225"},{"issue":"4","key":"149_CR39","first-page":"351","volume":"4","author":"S.S. Yau","year":"2010","unstructured":"Yau, S.S. \/ An, H.G. (2010) Confidentiality Protection in Cloud Computing Systems. Int. J. Software and Informatics 4(4):351\u2013365","journal-title":"Int. J. Software and Informatics"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0149-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0149-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0149-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0149-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T16:21:29Z","timestamp":1643473289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0149-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,27]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["149"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0149-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,27]]}}}