{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T11:53:20Z","timestamp":1649159600876},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2013,7,10]],"date-time":"2013-07-10T00:00:00Z","timestamp":1373414400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11623-013-0205-z","type":"journal-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T06:27:45Z","timestamp":1373351265000},"page":"491-496","source":"Crossref","is-referenced-by-count":0,"title":["Konzept und Nutzen von Certificate Policy und Certification Practice Statement"],"prefix":"10.1007","volume":"37","author":[{"given":"J\u00fcrgen","family":"Brauckmann","sequence":"first","affiliation":[]},{"given":"Ralf","family":"Gr\u00f6per","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,10]]},"reference":[{"key":"205_CR1","unstructured":"Spiegel Online, \u201eSchludrige Schl\u00fcsselmeister gef\u00e4hrden das Web\u201c, \n                    http:\/\/www.spiegel.de\/netzwelt\/netzpolitik\/internet-sicherheit-schludrigeschluesselmeister-gefaehrden-das-web-a-786481.html"},{"key":"205_CR2","volume-title":"9, Dirk Fox, Eine \u201aPGP-Policy\u2019 f\u00fcr Unternehmen","author":"DuD 22","year":"1998","unstructured":"DuD 22 (1998) 9, Dirk Fox, Eine \u201aPGP-Policy\u2019 f\u00fcr Unternehmen"},{"key":"205_CR3","unstructured":"ITU-T Recommendation X.509 (11\/1988) \u2014 THE DIRECTORY \u2014 AUTHENTICATION FRAMEWORK"},{"key":"205_CR4","unstructured":"ITU-T Recommendation X.509 (11\/1993) \u2014 THE DIRECTORY \u2014 AUTHENTICATION FRAMEWORK"},{"key":"205_CR5","unstructured":"ITU-T Recommendation X.509 (08\/1997) \u2014 THE DIRECTORY \u2014 AUTHENTICATION FRAMEWORK"},{"key":"205_CR6","unstructured":"IETF, RFC1422, S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, Februar 1993, \n                    http:\/\/www.ietf.org\/rfc\/rfc1422.txt"},{"key":"205_CR7","unstructured":"American Bar Association, Digital Signature Guidelines, August 1996"},{"key":"205_CR8","unstructured":"IETF, RFC 2527, S. Chokhani, W. Ford, Internet X.509 Public Key Infrastructure, Certificate Policy and Certification Practices, M\u00e4rz 1999, Framework, \n                    http:\/\/www.ietf.org\/rfc\/rfc2527.txt"},{"key":"205_CR9","unstructured":"IETF, RFC 3647, S. Chokhani, W. Ford, R. Sabett, C. Merrill, S. Wu, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, November 2003, \n                    http:\/\/www.ietf.org\/rfc\/rfc3647.txt"},{"key":"205_CR10","volume-title":"X9.79 PKI Practices and Policy Framework for the Financial Services Industry","author":"ANSI","year":"2001","unstructured":"ANSI, X9.79 PKI Practices and Policy Framework for the Financial Services Industry, 2001"},{"key":"205_CR11","volume-title":"WebTrust\u2122 Program for Certification Authorities Version 1.0","author":"AICPA\/CICA","year":"2000","unstructured":"AICPA\/CICA, WebTrust\u2122 Program for Certification Authorities Version 1.0, August 25, 2000"},{"key":"205_CR12","volume-title":"Electronic Signatures and Infrastructures (ESI): Policy requirements for certification authorities issuing qualified certificates","author":"ETSI ESI TS 101 456 v1.1.1","year":"2000","unstructured":"ETSI ESI TS 101 456 v1.1.1, Electronic Signatures and Infrastructures (ESI): Policy requirements for certification authorities issuing qualified certificates, Dezember 2000"},{"key":"205_CR13","volume-title":"Electronic Signatures and Infrastructures (ESI): Policy requirements for certification authorities issuing public key certificates","author":"ETSI ESI TS 102 042 v1.1.1","year":"2002","unstructured":"ETSI ESI TS 102 042 v1.1.1, Electronic Signatures and Infrastructures (ESI): Policy requirements for certification authorities issuing public key certificates, April 2002"},{"key":"205_CR14","unstructured":"Comodo Certification Practice Statement v. 4.0, October 2012, \n                    http:\/\/www.comodo.com\/about\/comodo-agreements.php"},{"key":"205_CR15","volume-title":"Zertifizierungsrichtlinien f\u00fcr die DFN-PCA, Medium-Level Policy, Version 1.0","author":"DFN-Verein","year":"1997","unstructured":"DFN-Verein, Zertifizierungsrichtlinien f\u00fcr die DFN-PCA, Medium-Level Policy, Version 1.0, April 1997"},{"key":"205_CR16","volume-title":"Zertifizierungsrichtlinien f\u00fcr die DN-PCA, Low-Level Policy, Version 1.0","author":"DFN-Verein","year":"1997","unstructured":"DFN-Verein, Zertifizierungsrichtlinien f\u00fcr die DN-PCA, Low-Level Policy, Version 1.0, April 1997"},{"key":"205_CR17","volume-title":"Zertifizierungsrichtlinien f\u00fcr die DFN-PCA, Die World Wide Web Policy, Version 1.0","author":"DFN-Verein","year":"1999","unstructured":"DFN-Verein, Zertifizierungsrichtlinien f\u00fcr die DFN-PCA, Die World Wide Web Policy, Version 1.0, April 1999"},{"key":"205_CR18","unstructured":"DFN-Verein, Policies der DFN-PKI, \n                    http:\/\/www.pki.dfn.de\/policies"},{"key":"205_CR19","unstructured":"Symantec Trust Network (STN) Certificate Policy Version 2.8.11, Februar 2013, \n                    http:\/\/www.verisign.com\/repository\/index.html"},{"key":"205_CR20","unstructured":"Symantec Trust Network (STN) Certification Practices Statement Version 3.8.12, Februar 2013, \n                    http:\/\/www.verisign.com\/repository\/index.html"},{"key":"205_CR21","volume-title":"Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.1","author":"CA\/Browser Forum","year":"2012","unstructured":"CA\/Browser Forum, Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.1, September 2012, \n                    https:\/\/www.cabforum.org"},{"key":"205_CR22","volume-title":"Guidelines for the Issuance and Management of Extended Validation (EV) Certificates, Version 1.4","author":"CA\/Browser Forum","year":"2012","unstructured":"CA\/Browser Forum, Guidelines for the Issuance and Management of Extended Validation (EV) Certificates, Version 1.4, Mai 2012, \n                    https:\/\/www.cabforum.org"},{"key":"205_CR23","volume-title":"Zertifizierungsrichtlinien","author":"TC TrustCenter","year":"2010","unstructured":"TC TrustCenter, Zertifizierungsrichtlinien, Januar 2010, \n                    http:\/\/www.trustcenter.de\/about\/repository.htm"},{"key":"205_CR24","volume-title":"Certification Practice Statement Version 1.9.3","author":"TC TrustCenter GmbH","year":"2010","unstructured":"TC TrustCenter GmbH, Certification Practice Statement Version 1.9.3, Januar 2010, \n                    http:\/\/www.trustcenter.de\/about\/repository.htm"},{"key":"205_CR25","unstructured":"Mozilla CA Certificate Store, \n                    http:\/\/www.mozilla.org\/projects\/security\/certs"},{"key":"205_CR26","unstructured":"TeleTrusT European Bridge CA, \n                    https:\/\/www.ebca.de"},{"key":"205_CR27","unstructured":"The European Policy Management Authority for Grid Authentication in e-Science, \n                    http:\/\/www.eugridpma.org"},{"key":"205_CR28","unstructured":"Revocation checking and Chrome\u2019s CRL, Februar 2012) \n                    http:\/\/www.imperialviolet.org\/2012\/02\/05\/crlsets.html"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0205-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0205-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0205-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0205-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:37Z","timestamp":1559413357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0205-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,10]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["205"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0205-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,10]]}}}