{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T19:35:56Z","timestamp":1686166556680},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T00:00:00Z","timestamp":1525046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11623-018-0940-2","type":"journal-article","created":{"date-parts":[[2018,4,29]],"date-time":"2018-04-29T22:47:37Z","timestamp":1525042057000},"page":"277-280","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Karlsruher Thesen zur Digitalen Souver\u00e4nit\u00e4t Europas"],"prefix":"10.1007","volume":"42","author":[{"given":"J\u00fcrgen","family":"Beyerer","sequence":"first","affiliation":[]},{"given":"J\u00f6rn","family":"M\u00fcller-Quade","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Reussner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"940_CR1","volume-title":"Kompetenzen f\u00fcr eine Digitale Souver\u00e4nit\u00e4t. Studie im Auftrag des Bundesministeriums f\u00fcr Wirtschaft und Energie (BMWi)","author":"L Kranich","year":"2017","unstructured":"Luise Kranich (FZI), Philip Hauth (Accenture GmbH), Axel Pols (Bitkom Research GmbH). Kompetenzen f\u00fcr eine Digitale Souver\u00e4nit\u00e4t. Studie im Auftrag des Bundesministeriums f\u00fcr Wirtschaft und Energie (BMWi). FZI Forschungszentrum Informatik: Juni 2017. Online: https:\/\/www.bmi.bund.de\/cybersicherheitsstrategie\/BMI_CyberSicherheitsStrategie.pdf."},{"key":"940_CR2","unstructured":"Bundesministerium des Innern (BMI). Cybersicherheitsstrategie f\u00fcr Deutschland 2016. Artikelnummer: BMI16013. November 2016. Online: https:\/\/www.bmi.bund.de\/SharedDocs\/downloads\/DE\/publikationen\/2016\/cybersicherheitsstrategie-2016.pdf."},{"key":"940_CR3","volume-title":"Positionspapier\u2013Cybersicherheit in Deutschland","author":"M Waidner CRISP","year":"2017","unstructured":"Michael Waidner (CRISP), Michael Backes (CISPA), J\u00f6rn M\u00fcller-Quade (KASTEL). Positionspapier \u2013 Cybersicherheit in Deutschland. Fraunhofer-Institut f\u00fcr Sichere Informationstechnologie (SIT) Technical Report. Fraunhofer Verlag: 14. Februar 2017."},{"key":"940_CR4","volume-title":"Sicherheit auf festem Fundament\u2013Starke Sicherheit durch vertrauensw\u00fcrdige Hardware","author":"B Broadnax","year":"2017","unstructured":"Brandon Broadnax, Bernhard L\u00f6we, Jeremias Mechler, J\u00f6rn M\u00fcller-Quade, Matthias Nagel. Sicherheit auf festem Fundament\u2013Starke Sicherheit durch vertrauensw\u00fcrdige Hardware. Datenschutz und Datensicherheit-DuD 42, Nr. 2 (2017)."},{"key":"940_CR5","unstructured":"Bundesministerium f\u00fcr Bildung und Forschung (BMBF). Selbstbestimmt und sicher in der digitalen Welt 2015-2020. Forschungsrahmenprogramm der Bundesregierung zur IT-Sicherheit. Januar 2016. Online: https:\/\/www.bmbf.de\/pub\/Forschungsrahmenprogramm_IT_Sicherheit. pdf."},{"key":"940_CR6","unstructured":"Bundesministerium f\u00fcr Wirtschaft und Energie (BMWi). Wei\u03b2buch Digitale Plattformen\u2013Digitale Ordnungspolitik f\u00fcr Wachstum, Innovation, Wettbewerb und Teilhabe. M\u00e4rz 2017. Online: https:\/\/www.bmwi.de\/Redaktion\/DE\/Publikationen\/Digitale-Welt\/weissbuch-digitale-plattformen.html."},{"key":"940_CR7","first-page":"24","volume-title":"Sicherheit relativ definieren\u2013Das Real\/Ideal Paradigma in der Kryptographie","author":"B Broadnax","year":"2017","unstructured":"Brandon Broadnax, Jeremias Mechler, J\u00f6rn M\u00fcller-Quade, Matthias Nagel, Jochen Rill. Sicherheit relativ definieren\u2013Das Real\/Ideal Paradigma in der Kryptographie. Datenschutz und Datensicherheit-DuD 41, Nr. 1 (2017): 24\u201328."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0940-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0940-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0940-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T08:40:28Z","timestamp":1556613628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0940-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,30]]},"references-count":7,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["940"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0940-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,30]]},"assertion":[{"value":"30 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}