{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:07:13Z","timestamp":1649063233148},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11623-021-1427-0","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T12:04:29Z","timestamp":1615896269000},"page":"244-248","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bedeutung des Cybersecurity Acts f\u00fcr die IT-Sicherheitszertifizierung in Deutschland und Europa"],"prefix":"10.1007","volume":"45","author":[{"given":"Bernd","family":"Kowalski","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Intemann","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"M\u00fchlenbruch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"key":"1427_CR1","unstructured":"Verordnung (EU) 2019\/881 des Europ\u00e4ischen Parlaments und des Rates vom 17. April 2019 \u00fcber die ENISA (Agentur der Europ\u00e4ischen Union f\u00fcr Cybersicherheit) und \u00fcber die Zertifizierung der Cybersicherheit von Informations- und Kommunikationstechnik und zur Aufhebung der Verordnung (EU) Nr.\u00a0526\/2013 (Rechtsakt zur Cybersicherheit), https:\/\/data.europa.eu\/eli\/reg\/2019\/881\/oj"},{"key":"1427_CR2","unstructured":"ENISA, Cybersecurity Certification: EUCC Candidate Scheme, ver\u00f6ffentlicht am 02.07.2020, https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-certification-eucc-candidate-scheme\/ (Webseite) und https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-certification-eucc-candidate-scheme\/at_download\/fullReport (pdf)"},{"key":"1427_CR3","unstructured":"ENISA, After cloud\u2026cybersecurity certification: launching the ENISA ad hoc Working Group on Cloud Services, ver\u00f6ffentlicht am 06.03.2020, https:\/\/www.enisa.europa.eu\/news\/enisa-news\/after-cloud-cybersecurity-certification-launching-the-enisa-ad-hoc-working-group-on-cloud-services"},{"key":"1427_CR4","unstructured":"ENISA, EUCS \u2013 Cloud Services Scheme, ver\u00f6ffentlicht am 22.12.2020, https:\/\/www.enisa.europa.eu\/publications\/eucs-cloud-service-scheme\/ (Webseite) und https:\/\/www.enisa.europa.eu\/publications\/eucs-cloud-service-scheme\/at_download\/fullReport (PDF)"},{"key":"1427_CR5","unstructured":"SOG-IS, Senior Officials Group Information Systems Securit, https:\/\/www.sogis.eu\/"},{"key":"1427_CR6","unstructured":"Statement of the SOG-IS Management Committee on the relation between the SOG-IS Agreement and the European Certification Framework that is under negotiation at the EU Commission. https:\/\/www.sogis.eu\/documents\/mra\/201802-SOGIS-Position.pdf (PDF)"},{"key":"1427_CR7","unstructured":"Kriterienkatalog Cloud Computing C5, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Empfehlungen-nach-Angriffszielen\/Cloud-Computing\/Kriterienkatalog-C5\/kriterienkatalog-c5_node.html"},{"key":"1427_CR8","unstructured":"SecNumCloud, Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, https:\/\/www.ssi.gouv.fr\/actualite\/secnumcloud-evolue-et-passe-a-lheure-du-rgpd\/"},{"key":"1427_CR9","unstructured":"GSMA, eUICC certification, www.gsma.com\/esim\/compliance\/"},{"key":"1427_CR10","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s11623-020-1264-6","volume":"44","author":"DK Kipker","year":"2020","unstructured":"Kipker, DK. EU Cybersecurity Act und Certification Schemes: ein aktueller Fortschrittsbericht. Datenschutz Datensicherheit 44, 263\u2013265 (2020). https:\/\/doi.org\/10.1007\/s11623-020-1264-6","journal-title":"Datenschutz Datensicherheit"},{"key":"1427_CR11","unstructured":"Verordnung (EU) Nr.\u00a0182\/2011 des Europ\u00e4ischen Parlaments und des Rates vom 16. Februar 2011 zur Festlegung der allgemeinen Regeln und Grunds\u00e4tze, nach denen die Mitgliedstaaten die Wahrnehmung der Durchf\u00fchrungsbefugnisse durch die Kommission kontrollieren, http:\/\/data.europa.eu\/eli\/reg\/2011\/182\/oj"},{"key":"1427_CR12","unstructured":"Cybersecurity of 5G networks: Commission requests the EU cybersecurity agency to develop a certification scheme, ver\u00f6ffentlicht am 03.02.2021, https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/cybersecurity-5g-networks-commission-requests-eu-cybersecurity-agency-develop-certification"},{"key":"1427_CR13","unstructured":"Securing EU\u2019s Vision on 5G: Cybersecurity Certification, ver\u00f6ffentlicht am 03.02.2021, https:\/\/www.enisa.europa.eu\/news\/enisa-news\/securing_eu_vision_on_5g_cybersecurity_certification"},{"key":"1427_CR14","unstructured":"Liste von Bundesamt f\u00fcr Sicherheit in der Informationstechnik zertifizierte Schutzprofile f\u00fcr Common Criteria, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Zertifizierung-und-Anerkennung\/Zertifizierung-von-Produkten\/Zertifizierung-nach-CC\/Schutzprofile-Protection-Profiles-PP\/SchutzprofileProtectionProfiles_Aktuell\/schutzprofile_pps_aktuell_node.html"},{"key":"1427_CR15","unstructured":"Liste von Produkten, die durch das Bundesamt f\u00fcr Sicherheit in der Informationstechnik nach Common Criteria zertifiziert sind, Bundesamt f\u00fcr Sicherheit in der Informationstechnik, https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Zertifizierung-und-Anerkennung\/Zertifizierung-von-Produkten\/Zertifizierung-nach-CC\/Zertifizierte-Produkte-nach-CC\/zertifizierte-produkte-nach-cc_node.html"},{"key":"1427_CR16","unstructured":"GSMA, Network Equipment Security Assurance Scheme (NESAS), https:\/\/www.gsma.com\/security\/network-equipment-security-assurance-scheme\/"},{"key":"1427_CR17","unstructured":"Bundesnetzagentur, Katalog von Sicherheitsanforderungen 2.0, https:\/\/www.bundesnetzagentur.de\/DE\/Sachgebiete\/Telekommunikation\/Unternehmen_Institutionen\/Anbieterpflichten\/OeffentlicheSicherheit\/KatalogSicherheitsanforderungen\/Sicherheitsanforderungen-node.html"},{"key":"1427_CR18","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s11623-018-0970-9","volume":"42","author":"B Kowalski","year":"2018","unstructured":"Kowalski, B., Intemann, M. Perspektiven der IT-Sicherheits-Zertifizierung f\u00fcr Europas M\u00e4rkte. Datenschutz Datensich 42, 415\u2013419 (2018). https:\/\/doi.org\/10.1007\/s11623-018-0970-9","journal-title":"Datenschutz Datensich"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-021-1427-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-021-1427-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-021-1427-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T12:52:05Z","timestamp":1615899125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-021-1427-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["1427"],"URL":"https:\/\/doi.org\/10.1007\/s11623-021-1427-0","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,16]]},"assertion":[{"value":"16 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}