{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:19:27Z","timestamp":1734067167435,"version":"3.30.2"},"reference-count":0,"publisher":"PTI","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2014f460","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:08:07Z","timestamp":1412024887000},"page":"123-130","source":"Crossref","is-referenced-by-count":2,"title":["Achieving Software Security for Measuring Instruments under Legal Control"],"prefix":"10.15439","volume":"3","author":[{"given":"Daniel","family":"Peters","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Grottker","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Thiel","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Peter","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2014,9,29]]},"event":{"name":"2014 Federated Conference on Computer Science and Information Systems","start":{"date-parts":[[2014,9,7]]},"end":{"date-parts":[[2014,9,10]]},"acronym":"FedCSIS 2014"},"container-title":["Annals of Computer Science and Information Systems","Position Papers of the 2014 Federated Conference on Computer Science and Information Systems"],"original-title":[],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:31:23Z","timestamp":1733988683000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_3\/drp\/460.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,29]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2014f460","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2014,9,29]]}}}