{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T11:15:43Z","timestamp":1712574943085},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T00:00:00Z","timestamp":1520812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s11623-018-0914-4","type":"journal-article","created":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T06:40:27Z","timestamp":1520836827000},"page":"236-240","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Umsetzung technischer Anforderungen der DSGVO mittels eIDAS-VO-konformer Vertrauensdienste"],"prefix":"10.1007","volume":"42","author":[{"given":"Arno","family":"Fiedler","sequence":"first","affiliation":[]},{"given":"Christian","family":"Thiel","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,12]]},"reference":[{"key":"914_CR1","unstructured":"Richtlinie 95\/46\/EG des Europ\u00e4ischen Parlaments und des Rates vom 24. Oktober 1995 zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten und zum freien Datenverkehr http:\/\/eur-lex.europa.eu\/legalcotent\/DE\/TXT\/HTML\/?uri=CELEX:31995L0046&from=en"},{"key":"914_CR2","unstructured":"Eleni Kosta, Kees Stuurman, Technical standards and the draft General Data Protection Regulation, Tilburg Institute for Law, Technology, and Society (TILT), Preprint Publications"},{"key":"914_CR3","unstructured":"Implementierungsleitfaden ISO\/IEC 27001:2013\u2013Ein Praxisleitfaden f\u00fcr die Implementierung eines ISMS nach ISO\/IEC 27001:2013, Herausgeber: ISACA Germany Chapter e.V., dpunkt.verlag Mai 2016"},{"key":"914_CR4","doi-asserted-by":"crossref","unstructured":"Benedikt Buchner, J\u00fcrgen K\u00fchling, Die Einwilligung in der Datenschutzordnung 2018, Datenschutz und Datensicherheit 35(1): 544-548 (2017)","DOI":"10.1007\/s11623-017-0828-6"},{"key":"914_CR5","unstructured":"REGULATION (EU) No 910\/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC[6] Mandate M460: \u201cStandardisation Mandate to the European Standardisation Organisations CEN, CENELEC and ETSI in the Field of Information and Communication Technologies Applied to Electronic Signatures\u201d."},{"issue":"1","key":"914_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s11623-013-0005-5","volume":"37","author":"A Fiedler","year":"2013","unstructured":"Fiedler, A., Thiel, C., Der grenzenlose digitale Binnenmarkt. Datenschutz und Datensicherheit, Datenschutz und Datensicherheit 37(1): 14\u201319 (2013)","journal-title":"Datenschutz und Datensicherheit"},{"issue":"1","key":"914_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11623-011-0010-5","volume":"35","author":"A Fiedler","year":"2011","unstructured":"Fiedler, A., Thiel, C., Signaturstandardisierung: Selbstzweck oder Notwendigkeit?\u2013Die Langzeitvalidierung von PDF-Dokumenten als gutes Beispiel. Datenschutz und Datensicherheit 35(1): 36\u201340 (2011)","journal-title":"Datenschutz und Datensicherheit"},{"issue":"10","key":"914_CR8","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s11623-016-0680-0","volume":"40","author":"A Fiedler","year":"2016","unstructured":"Fiedler, A., Thiel, C., Thiel, C., Organisations\u00fcbergreifendes Sicherheits- und Servicemanagement mittels eIDAS-konformer Vertrauensdienste, Datenschutz und Datensicherheit 40(10): 675\u2013679 (2016)","journal-title":"Datenschutz und Datensicherheit"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0914-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0914-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0914-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T00:34:31Z","timestamp":1552350871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0914-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,12]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["914"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0914-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,12]]},"assertion":[{"value":"12 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}