{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T02:04:56Z","timestamp":1692410696325},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11623-014-0270-y","type":"journal-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T19:55:13Z","timestamp":1412106913000},"page":"679-683","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Certificate Transparency"],"prefix":"10.1007","volume":"38","author":[{"given":"Arno","family":"Fiedler","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,1]]},"reference":[{"key":"270_CR1","volume-title":"SSL and TLS. Designing and building secure systems","author":"E Rescorla","year":"2001","unstructured":"E. Rescorla: SSL and TLS. Designing and building secure systems. Addison-Wesley, New York NY u. a. 2001."},{"key":"270_CR2","unstructured":"OpenSSL Security Advisory vom 7. April 2014, aufgerufen am 30.06.2014."},{"key":"270_CR3","volume-title":"Unpublished draft","author":"K Bhargavan","year":"2014","unstructured":"K. Bhargavan, A. Delignat-Lavaud, Fournet, C., Pironti, A., and P. Strub, \u201cTriple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS\u201d, Unpublished draft, 2014."},{"key":"270_CR4","volume-title":"Zwischenbericht DigiNotar Certificate Authority Hack und Relevanz f\u00fcr \u00d6sterreich, Cert.at","author":"L A Kaplan","year":"2011","unstructured":"L. A. Kaplan, O. Lendl: Zwischenbericht DigiNotar Certificate Authority Hack und Relevanz f\u00fcr \u00d6sterreich, Cert.at. 2011."},{"key":"270_CR5","unstructured":"\u201cReport of incident on 15-MAR-2011\u201d. Comodo group. Aufgerufen am 30.06.2014"},{"key":"270_CR6","volume-title":"Here Come The Ninjas","author":"T Duong","year":"2011","unstructured":"T. Duong, J. Rizzo: Here Come The Ninjas, 2011. (\n                    https:\/\/bug665814.bugzilla.mozilla.org\/attachment.cgi?Id=540839\n                    \n                  , aufgerufen am 30.06.2014)."},{"key":"270_CR7","volume-title":"US and UK spy agencies defeat privacy and security on the internet","author":"J Ball","year":"2013","unstructured":"J. Ball, J. Borger, and G. Greenwald \u201cUS and UK spy agencies defeat privacy and security on the internet\u201d. The Guardian, September 5, 2013. (\n                    http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security\n                    \n                  , aufgerufen am 30.06.2014)"},{"key":"270_CR8","unstructured":"B. Beck: LibreSSL \u2014 An OpenSSL replacement. The first 30 days, and where we go from here. BSDCAN 2014. (\n                    http:\/\/www.openbsd.org\/papers\/bsdcan14-libressl\/\n                    \n                  , aufgerufen am 30.06.2014."},{"key":"270_CR9","unstructured":"A. Langley: BoringSSL, \n                    https:\/\/www.imperialviolet.org\/2014\/06\/20\/boringssl.html\n                    \n                   und \n                    https:\/\/boringssl.googlesource.com\/?format=HTML\n                    \n                  , jeweils aufgerufen am 30.06.2014."},{"key":"270_CR10","volume-title":"Sicherheit und Kryptographie im Internet. Von sicherer E-Mail bis zu IP-Verschl\u00fcsselung, herausgegeben von Vieweg+Teubner Verlag \/ GWV Fachverlage GmbH, Wiesbaden","author":"J Schwenk","year":"2010","unstructured":"J. Schwenk: Sicherheit und Kryptographie im Internet. Von sicherer E-Mail bis zu IP-Verschl\u00fcsselung, herausgegeben von Vieweg+Teubner Verlag \/ GWV Fachverlage GmbH, Wiesbaden, 2010."},{"key":"270_CR11","volume-title":"IT-Sicherheit. Konzepte \u2014 Verfahren \u2014 Protokolle","author":"C Eckert","year":"2009","unstructured":"C. Eckert: IT-Sicherheit. Konzepte \u2014 Verfahren \u2014 Protokolle. 6. \u00fcberarbeitete Auflage. Oldenbourg, M\u00fcnchen u. a. 2009.","edition":"6. \u00fcberarbeitet"},{"key":"270_CR12","unstructured":"A. Langley Enhancing digital certificate security, \n                    http:\/\/googleonlinesecurity.blogspot.de\/2013\/01\/enhancing-digital-certificate-security.html\n                    \n                  , aufgerufen am 30.06.2014."},{"key":"270_CR13","unstructured":"RFC 6698 \u2014 The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA"},{"key":"270_CR14","unstructured":"Pinning QUELLE"},{"key":"270_CR15","volume-title":"SSH, The Secure Shell: The Definitive Guide, O\u2019Reilly & Associates","author":"D Barrett","year":"2005","unstructured":"D. Barrett, R. Silverman, R. Byrnes: SSH, The Secure Shell: The Definitive Guide, O\u2019Reilly & Associates, 2005."},{"key":"270_CR16","unstructured":"RFC 6962 \u2014 Certificate Transparency, Experimental Request for Comments"},{"key":"270_CR17","unstructured":"RFC 6844 \u2014 DNS Certification Authority Authorization (CAA) Resource Record"},{"key":"270_CR18","unstructured":"CA\/Browser Forum, \n                    https:\/\/cabforum.org\/\n                    \n                  , aufgerufen am 30.06.2014"},{"key":"270_CR19","unstructured":"http:\/\/www.certificate-transparency.org\/\n                    \n                  , aufgerufen am 30.06.2014"},{"key":"270_CR20","unstructured":"Certificate Transparency Log Policy, \n                    https:\/\/sites.google.com\/a\/chromium.org\/dev\/Home\/chromium-security\/certificate-transparency\/log-policy\n                    \n                  , aufgerufen am 30.06.2014"},{"key":"270_CR21","unstructured":"http:\/\/www.internetworldstats.com\/stats.htm\n                    \n                  , aufgerufen am 30.06.2014"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0270-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0270-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0270-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0270-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:44Z","timestamp":1559413364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0270-y"}},"subtitle":["Google baut neuen Vertrauensraum f\u00fcr SSL-PKI auf"],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["270"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0270-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}