{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T16:50:55Z","timestamp":1754153455149,"version":"3.41.2"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s11623-025-2119-y","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T05:34:09Z","timestamp":1753248849000},"page":"448-452","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Zero-Touch Onboarding"],"prefix":"10.1007","volume":"49","author":[{"given":"Kerstin","family":"Honskamp","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Schmeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,23]]},"reference":[{"key":"2119_CR1","unstructured":"Hacker l\u00e4sst offenbar Glocken des Stephansdoms l\u00e4uten. 2022. https:\/\/www.spiegel.de\/panorama\/justiz\/wien-hacker-laesst-offenbar-glocken-des-stephansdoms-laeuten-a-39fa267d-e978-48b8-9a2f-220339662784"},{"key":"2119_CR2","unstructured":"Richtlinie (EU) 2016\/1148 des Europ\u00e4ischen Parlaments und des Rates. 2016. https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/PDF\/?uri=CELEX:32016L1148"},{"key":"2119_CR3","unstructured":"Was sind Kritische Infrastrukturen? 2025. https:\/\/www.bsi.bund.de\/dok\/kritis-allgemein"},{"key":"2119_CR4","unstructured":"Le dispositif SAIV. 2025. https:\/\/cyber.gouv.fr\/le-dispositif-saiv"},{"key":"2119_CR5","unstructured":"Cyber Resilience Act. 2025. https:\/\/www.bsi.bund.de\/dok\/cra"},{"key":"2119_CR6","unstructured":"Cyber Security. 2025. https:\/\/www.iec.ch\/cyber-security"},{"key":"2119_CR7","doi-asserted-by":"crossref","unstructured":"K. Watsen, I. Farrer, M. Abrahamsson. 2019. Secure Zero Touch Provisioning (SZTP). RFC 8572. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8572","DOI":"10.17487\/RFC8572"},{"key":"2119_CR8","doi-asserted-by":"crossref","unstructured":"M. Pritikin M. Richardson T. Eckert M. Behringer. 2021. Bootstrapping Remote Secure Key Infrastructure (BRSKI). RFC 8995. https:\/\/datatracker.ietf.org\/doc\/html\/rfc8995","DOI":"10.17487\/RFC8995"},{"key":"2119_CR9","unstructured":"FIDO Device Onboard Specification 1.1. 2022. https:\/\/fidoalliance.org\/specs\/FDO\/FIDO-Device-Onboard-PS-v1.1-20220419\/FIDO-Device-Onboard-PS-v1.1-20220419.pdf"},{"key":"2119_CR10","doi-asserted-by":"crossref","unstructured":"OPC 10000-21: UA Part 21: Device Onboarding. 2024. https:\/\/reference.opcfoundation.org\/Onboarding\/v105\/docs\/","DOI":"10.5040\/9798216170631.0006"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2119-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2119-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2119-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T05:34:12Z","timestamp":1753248852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2119-y"}},"subtitle":["Sichere Identit\u00e4ten f\u00fcr das Internet der Dinge"],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":10,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2119"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2119-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"23 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}