{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:50:54Z","timestamp":1755798654897,"version":"3.44.0"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11623-025-2132-1","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T12:04:05Z","timestamp":1755605045000},"page":"522-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RFC 9116 (\u201csecurity.txt\u201d) an deutschen Hochschulservern"],"prefix":"10.1007","volume":"49","author":[{"given":"Finn","family":"Eckstein","sequence":"first","affiliation":[]},{"given":"Ria","family":"Rosenauer","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Huppert","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Herrmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"2132_CR1","unstructured":"Eva Wolfangel. Er hat die Server von Unis gehackt. Zum Gl\u00fcck ist er einer von den Guten. ZEIT Nr.\u00a004\/2023 https:\/\/www.zeit.de\/2023\/04\/it-sicherheit-hochschule-sicherheitsluecken-hacker."},{"key":"2132_CR2","doi-asserted-by":"crossref","unstructured":"Edwin Foudil and Yakov Shafranovich. A File Format to Aid in Security Vulnerability Disclosure. RFC 9116, April 2022. https:\/\/www.rfc-editor.org\/info\/rfc9116.","DOI":"10.17487\/RFC9116"},{"key":"2132_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Sicherheitskontakte mit Hilfe einer security.txt nach RFC 9116 angeben, BSI-CS149,09.04.2024 https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102-2.pdf?__blob=publicationFile&v=7"},{"key":"2132_CR4","doi-asserted-by":"crossref","unstructured":"Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, and Christian Rossow. Didn\u2019t you hear me? \u2013 towards more successful web vulnerability notifications. In: Network and Distributed System Security (NDSS). February 2018. https:\/\/publications.cispa.de\/articles\/conference_contribution\/Didn_t_You_Hear_Me_---_Towards_More_Successful_Web_Vulnerability_Notifications\/24612648.","DOI":"10.14722\/ndss.2018.23171"},{"key":"2132_CR5","unstructured":"Max Maass, Alina St\u00f6ver, Henning Prid\u00f6hl, Sebastian Bretthauer, Dominik Herrmann, Matthias Hollick, and Indra Spiecker. Effective notification campaigns on the web: A matter of trust, framing, and support. In: 30th USENIX Security Symposium"},{"key":"2132_CR6","doi-asserted-by":"crossref","unstructured":"Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczy\u0144ski, Michel van Eeten, and Carlos Ga\u00f1\u00e1n. Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. In: 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2022.","DOI":"10.1109\/SP46214.2022.9833701"},{"key":"2132_CR7","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.13683979","author":"F Eckstein","year":"2024","unstructured":"Eckstein, F., Rosenauer, R. M. A., & Huppert, P. (2024). Schwer erreichbar: security.txt an deutsche Hochschulen bringen \u2013 Datens\u00e4tze und Scripte [Data set]. Zenodo.\u00a0https:\/\/doi.org\/10.5281\/zenodo.13683979","journal-title":"Zenodo"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2132-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2132-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2132-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T12:04:07Z","timestamp":1755605047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2132-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2132"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2132-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"19 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}