{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T03:07:07Z","timestamp":1648955227935},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11623-019-1095-5","type":"journal-article","created":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T19:14:41Z","timestamp":1554923681000},"page":"214-219","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Moderne Vertrauensdienste f\u00fcr vertrauensw\u00fcrdige Transaktionen"],"prefix":"10.1007","volume":"43","author":[{"given":"J\u00f6rg","family":"Schwenk","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Wich","sequence":"additional","affiliation":[]},{"given":"Detlef","family":"H\u00fchnlein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"key":"1095_CR1","unstructured":"(EU) 910\/2014. Verordnung (EU) Nr. 910\/2014 des Europ\u00e4ischen Parlaments und des Rates vom 23. Juli 2014 \u00fcber elektronische Identifizierung und Vertrauensdienste im Binnenmarkt und zur Aufhebung der Richtlinie 1999\/93\/EG. \n                           \n                    https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/HTML\/?uri=CELEX:32014R0910\n                    \n                  . 2014."},{"key":"1095_CR2","unstructured":"Mladenov, V., Mainka, C., Meyer, K., zu Selhausen, Grothe, M., and Schwenk, J. How to break PDF Signatures. \n                           \n                    https:\/\/www.pdf-insecurity.org\n                    \n                  . 2019."},{"key":"1095_CR3","unstructured":"ETSI EN 319 122-1. Electronic Signatures and Infrastructures (ESI); V1.1.1. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_en\/319100_319199\/31912201\/01.01.01_60\/en_31912201v010101p.pdf\n                    \n                  . 2016."},{"key":"1095_CR4","unstructured":"ETSI EN 319 132-1. Electronic Signatures and Infrastructures (ESI); V1.1.1. \n                           \n                    https:\/\/www.etsi.org\/deliver\/etsi_en\/319100_319199\/31913201\/01.01.01_60\/en_31913201v010101p.pdf\n                    \n                  . 2016."},{"key":"1095_CR5","unstructured":"ETSI EN 319 142-1. Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures, V1.1.1. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_en\/319100_319199\/31914201\/01.01.01_60\/en_31914201v010101p.pdf\n                    \n                  . 2016."},{"key":"1095_CR6","unstructured":"RFC 7515. M. Jones, J. Bradley, N. Sakimura: JSON Web Signature (JWS). \n                           \n                    https:\/\/tools.ietf.org\/html\/rfc7515\n                    \n                  . 2015."},{"key":"1095_CR7","unstructured":"BSI TR-03125. Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): Beweiswerterhaltung kryptographisch signierter Dokumente, BSI TR-03125, Version 1.2.1. \n                           \n                    https:\/\/tr-esor.de\n                    \n                  . 2018."},{"key":"1095_CR8","doi-asserted-by":"crossref","unstructured":"H\u00fchnlein, D., Korte, U., K\u00fchne, A., and R\u00f6ck, A. Neue APIs f\u00fcr das eIDAS-\u00d6kosystem. im vorliegenden Heft. 2019.","DOI":"10.1007\/s11623-019-1092-8"},{"key":"1095_CR9","unstructured":"ETSI TS 119 511. Electronic Signatures and Infrastructures (ESI); Policy and security requirements for trust service providers providing long-term preservation of digital signatures or unsigned data using signature techniques. 2019."},{"key":"1095_CR10","unstructured":"ETSI TS 119 512. Electronic Signatures and Infrastructures (ESI); Protocols for trust service providers providing long-term data preservation services. 2019."},{"key":"1095_CR11","unstructured":"ecsec & LuxTrust. ChipGateway Protocol. \n                           \n                    https:\/\/www.oasis-open.org\/committees\/download.php\/60049\/ChipGateway-Specification-OASIS.pdf\n                    \n                  . 2017."},{"key":"1095_CR12","unstructured":"H\u00fchnlein, D., H\u00fchnlein, T., Schuberth, S., Lottes, R., Crossley, N., and Otto, F. \u201cHow to harmonise local and remote signing,\u201d in Open Identity Summit 2019, GI LNI. 2019."},{"key":"1095_CR13","unstructured":"OASIS DSS LocSig. \u201cDSS Extension for Local Signature Computation Version 1.0,\u201d 27 July 2015. [Online]. Available: \n                    http:\/\/docs.oasis-open.org\/dss-x\/localsig\/v1.0\/cs01\/localsig-v1.0-cs01.pdf\n                    \n                  ."},{"key":"1095_CR14","unstructured":"OASIS L\/R. Local and Remote Signature Profile for OASIS Digital Signature Services Version 2.0. 2018."},{"key":"1095_CR15","unstructured":"Bleckmann, F., Frank, G., Hoppe, M., and Schnattinger, T.Notifizierung von eID-Systemen gem\u00e4\u00df eIDAS. im vorliegenden Heft."},{"key":"1095_CR16","unstructured":"Ro\u00dfnagel, H., Camenisch, J., Fritsch, L., Gross, T., Houdeau, D., Lehmann, A., and Shamah, J. (2012).\u201cFutureID \u2013 Shaping the Future of Electronic Identity,\u201d DuD, 36(3), pp. 189-194."},{"key":"1095_CR17","unstructured":"Kubach, M., and H\u00fchnlein, D. Vertrauensw\u00fcrdige Identit\u00e4ten f\u00fcr die Cloud: Arbeiten und Ergebnisse des SkIDentity-Projekts. Fraunhofer Verlag. 2014."},{"key":"1095_CR18","unstructured":"2016\/679\/EU. Verordnung (EU) 2016\/679 des Europ\u00e4ischen Parlaments und des Rates vom 27. Apr. 2016 zum Schutz nat\u00fcrlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95\/46\/EG (Datenschutz-Grundverordnung). \n                           \n                    http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj\n                    \n                  . 2016."},{"key":"1095_CR19","unstructured":"ETSI TS 119 612. Electronic Signatures and Infrastructures (ESI); Trusted Lists. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_ts\/119600_119699\/119612\/02.02.01_60\/ts_119612v020201p.pdf\n                    \n                  . 2016."},{"key":"1095_CR20","unstructured":"Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. 2017."},{"key":"1095_CR21","unstructured":"Benet, J. IPFS \u2013 Content Addressed, Versioned, P2P File System (DRAFT 3). 2014."},{"key":"1095_CR22","unstructured":"RFC 4998. Gondrom, T.; Brandner, R.; Pordesch, U. \n                           \n                    https:\/\/tools.ietf.org\/html\/rfc4998\n                    \n                  . 2007."},{"key":"1095_CR23","unstructured":"ETSI EN 319 162-1. Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_en\/319100_319199\/31916201\/01.00.00_20\/en_31916201v010000a.pdf\n                    \n                  . 2015."},{"key":"1095_CR24","unstructured":"Otto, F., Wich, T., H\u00fchnlein, T., Prechtl, M., and H\u00fchnlein, D. \u201cTowards a standardised preservation service for qualified electronic signatures and qualified electronic seals,\u201d in Open Identity Summit 2019, GI-LNI. 2019."},{"key":"1095_CR25","unstructured":"ETSI TR 102 038. TC Security \u2013 Electronic Signatures and Infrastructures (ESI); XML format for signature policies. 2002."},{"key":"1095_CR26","unstructured":"ETSI TS 102 853. Electronic Signatures and Infrastructures (ESI); Signaturue verification procedures and policies. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_ts\/102800_102899\/102853\/01.01.01_60\/ts_102853v010101p.pdf\n                    \n                  . 2012."},{"key":"1095_CR27","unstructured":"ETSI EN 319 102-1. Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation, Version 1.1.1. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_en\/319100_319199\/31910201\/01.01.01_60\/en_31910201v010101p.pdf\n                    \n                  . 2016."},{"key":"1095_CR28","unstructured":"ETSI TS 199 172-1. Electronic Signatures and Infrastructures (ESI); Signature Policies; Part 1: Building blocks and table of contents for human readable signature policy documents. \n                           \n                    http:\/\/www.etsi.org\/deliver\/etsi_ts\/119100_119199\/11917201\/01.01.01_60\/ts_11917201v010101p.pdf\n                    \n                  . 2015."},{"key":"1095_CR29","unstructured":"ETSI TS 119 102-2. Electronic Signatures and Infrastructures (ESI); V1.1.1. \n                           \n                    https:\/\/www.etsi.org\/deliver\/etsi_ts\/119100_119199\/11910202\/01.01.01_60\/ts_11910202v010101p.pdf\n                    \n                  . 2018."},{"key":"1095_CR30","unstructured":"ETSI TS 119 432. Electronic Signatures and Infrastructures (ESI); Protocols for remote digital signature creation. 2019."},{"key":"1095_CR31","unstructured":"SAML 2.0. \u201cOASIS Standard,\u201d 15 March 2005. [Online]. Available: \n                    http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-metadata-2.0-os.pdf\n                    \n                  ."},{"key":"1095_CR32","unstructured":"eIDAS Spec. eIDAS Technical Subgroup. \n                           \n                    https:\/\/joinup.ec.europa.eu\/software\/cefeid\/document\/eidas-technical-specifications-v10\n                    \n                  . 2015."},{"key":"1095_CR33","unstructured":"RFC 6749. D. Hardt (Ed.): The OAuth 2.0 Authorization Framework. \n                           \n                    https:\/\/tools.ietf.org\/html\/rfc6749\n                    \n                  . 2012."},{"key":"1095_CR34","unstructured":"OpenID Connect. OpenID Foundation. \n                           \n                    http:\/\/openid.net\/connect\/\n                    \n                  . 2015."},{"key":"1095_CR35","unstructured":"FIDO. \u201cFIDO Alliance,\u201d 2015. [Online]. Available: \n                    https:\/\/fidoalliance.org\/\n                    \n                  ."},{"key":"1095_CR36","unstructured":"GSMA-CPAS5. CPAS 5 OpenID Connect \u2013 Mobile Connect Profile \u2013 Version 1.1. \n                           \n                    https:\/\/github.com\/GSMA-OneAPI\/Mobile-Connect\/tree\/master\/specifications\n                    \n                  . 2015."},{"key":"1095_CR37","unstructured":"H\u00fchnlein, T. \u201cMethod and device for authentification\u201d. EU Patent EP2439900B1, 30 12 2015."},{"key":"1095_CR38","unstructured":"EPC 208-08. European Payments Council: EPC e-Mandates e-Operating Model \u2013 Detailed Specification, Version 1.2: \n                    http:\/\/www.europeanpaymentscouncil.eu\/index.cfm\/knowledge-bank\/epc-documents\/epc-e-mandates-e-operating-model-detailed-specification\/epc208-08-e-operating-model-detailed-specification-v12-approvedpdf\/\n                    \n                  . 2013."},{"key":"1095_CR39","unstructured":"Zwattendorfer, B., and Zefferer, T. T. A.\u201cThe Prevalence of SAML within the European Union,\u201d in 8th International Conference on Web Information Systems and Technologies (WEBIST).\n                           \n                    http:\/\/www.webist.org\/?y=2012\n                    \n                  . 2012."},{"key":"1095_CR40","unstructured":"OASIS DSS v1.0. \u201cProfile for Comprehensive Multi-Signature Verification Reports Version 1.0,\u201d 12 November 2010. [Online]. Available: \n                    http:\/\/docs.oasis-open.org\/dss-x\/profiles\/verificationreport\/oasis-dssx-1.0-profiles-vr-cs01.pdf\n                    \n                  ."},{"key":"1095_CR41","unstructured":"eIDAS \u2013 TSP-Map, 2019. [Online]. Available: \n                    https:\/\/www.eid.as\/tsp-map\/#\/\n                    \n                  ."},{"key":"1095_CR42","unstructured":"EU Trusted List. \u201cEuropean Commision,\u201d 2019. [Online]. Available: \n                    https:\/\/ec.europa.eu\/digital-agenda\/en\/eu-trusted-lists-certification-service-providers\n                    \n                  ."},{"key":"1095_CR43","unstructured":"European Commission. \u201cTrusted List Browser,\u201d 2019. [Online]. Available: \n                    https:\/\/webgate.ec.europa.eu\/tl-browser\/#\/\n                    \n                  ."},{"key":"1095_CR44","unstructured":"H\u00fchnlein, D. Besichtigung des \u201eeIDAS-\u00d6kosystems\u201c. \n                           \n                    https:\/\/blog.skidentity.de\/eidas-oekosystem\/\n                    \n                  . 2017."},{"key":"1095_CR45","unstructured":"Bender, J., Metzler, B., and R\u00e4th, N. Neues vom Online-Ausweis \u2013 Europ\u00e4isch, mobil, vor Ort \u2013 und mit Nachwuchs. im vorliegenden Heft."},{"key":"1095_CR46","unstructured":"Houdeau, D., H\u00fchnlein, T., and Wolfenstetter, K.-D. Digitale als Fundament der vertrauensw\u00fcrdigen Transformation. im vorliegenden Heft."},{"key":"1095_CR47","unstructured":"Wich, T. Open Source f\u00fcr den mobilen Identit\u00e4tsnachweis und die Signatur. im vorliegenden Heft."},{"key":"1095_CR48","unstructured":"FranceConnect. \n                    https:\/\/franceconnect.gouv.fr\/\n                    \n                  . 2019."},{"key":"1095_CR49","unstructured":"ecsec GmbH. SkIDentity erm\u00f6glicht go.eIDAS in nur zwei Minuten. \n                           \n                    https:\/\/skidentity.de\/ermoeglicht-go.eIDAS-in-nur-2-Minuten\n                    \n                  . 2018."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1095-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-019-1095-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1095-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T23:31:15Z","timestamp":1586388675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-019-1095-5"}},"subtitle":["Ergebnisse des Forschungsprojektes \u201cFutureTrust\u201d"],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1095"],"URL":"https:\/\/doi.org\/10.1007\/s11623-019-1095-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}