{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:53:04Z","timestamp":1648936384666},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11623-020-1261-9","type":"journal-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T12:04:59Z","timestamp":1584360299000},"page":"250-253","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Ledger Technologie (DLT) im Kontext europ\u00e4ischer Vertrauensdienste"],"prefix":"10.1007","volume":"44","author":[{"given":"Christoph","family":"Thiel","sequence":"first","affiliation":[]},{"given":"Christian","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"1261_CR1","unstructured":"IOTA \u2013 https:\/\/iota.org\/. Last visited 09.02.2020"},{"key":"1261_CR2","unstructured":"Projekt uPort \u2013 https:\/\/www.uport.me\/. Last visited 09.02.2020"},{"key":"1261_CR3","unstructured":"Sovrin \u2013 https:\/\/sovrin.org\/. W3C \u2013 Decentralized Identifiers (DIDs) v0.10 Last visited 09.02.2020"},{"issue":"6","key":"1261_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/2.153253","volume":"25","author":"J Turek","year":"1992","unstructured":"Turek, J., & Shasha, D. (1992). The many faces of consensus in distributed systems. Computer, 25(6), 8-17.","journal-title":"Computer"},{"key":"1261_CR5","unstructured":"REGULATION (EU) No 910\/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC[6] Mandate M460: \u201cStandardisation Mandate to the European Standardisation Organisations CEN, CENELEC and ETSI in the Field of Information and Communication Technologies Applied to Electronic Signatures\u201d."},{"key":"1261_CR6","unstructured":"Blockchain sicher gestalten, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Mai 2019"},{"issue":"1","key":"1261_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s11623-013-0005-5","volume":"37","author":"A Fiedler","year":"2013","unstructured":"Fiedler, A., Thiel, C., Der grenzenlose digitale Binnenmarkt. Datenschutz und Datensicherheit, Datenschutz und Datensicherheit 37(1): 14-19 (2013)","journal-title":"Datenschutz und Datensicherheit"},{"key":"1261_CR8","unstructured":"Locher, T., Obermeier, S., & Pignolet, Y.A. (2018) When Can a Distributed Ledger Replace a Trusted Third Party? arXiv, 1806.10929."},{"key":"1261_CR9","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In Proc. 37th IEEE Symposium on Security and Privacy (S&P).","DOI":"10.1109\/SP.2016.55"},{"key":"1261_CR10","doi-asserted-by":"crossref","unstructured":"Pahl, C., El Ioini, N., Helmer, S., & Lee, B. (2018) An architecture pattern for trusted orchestration in IoT edge clouds. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 63\u201370. IEEE","DOI":"10.1109\/FMEC.2018.8364046"},{"key":"1261_CR11","unstructured":"Schoder, D., Beitr\u00e4ge zu: Disintermediationsthese, E-Commerce, intermedi\u00e4r\/Intermediation, TTP (Trusted Third Partys), Zertifizierungsstelle, in:Schildhauer, Th. (Hrsg.): Lexikon Electronic Business, Oldenbourg Verlag M\u00fcnchen, ISBN 3-486-27263-2, 2003"},{"key":"1261_CR12","unstructured":"Walport, M. (2016) Distributed ledger technology: beyond blockchain. UK Government Office for Science."},{"key":"1261_CR13","unstructured":"ISO\/DIS 22739 Blockchain and distributed ledger technologies \u2013 Terminology"},{"key":"1261_CR14","unstructured":"Distributed ledger technology overview, concepts, ecosystem, Technical Report FG DLT D1.2, , ITU-T (2019)"},{"key":"1261_CR15","unstructured":"Ballandies, M.C., Dapp, M.M., Pournara, E. (2018) Decrypting Distributed Ledger Design -- Taxonomy, Classification and Blockchain Community Evaluation. arXiv, 1811.03419."},{"key":"1261_CR16","volume-title":"Networked Systems. NETYS 2018. Lecture Notes in Computer Science, vol 11028","author":"A Fern\u00e1ndez Anta","year":"2019","unstructured":"Fern\u00e1ndez Anta A., Georgiou C., Konwar K., Nicolaou N. (2019) Formalizing and Implementing Distributed Ledger Objects. In: Podelski A., Ta\u00efani F. (eds) Networked Systems. NETYS 2018. Lecture Notes in Computer Science, vol 11028. Springer, Cham"},{"key":"1261_CR17","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII. Lecture Notes in Computer Science, vol 11860","author":"B Putz","year":"2019","unstructured":"Putz B., Pernul G. (2019) Trust Factors and Insider Threats in Permissioned Distributed Ledgers. In: Hameurlain A., Wagner R. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII. Lecture Notes in Computer Science, vol 11860. Springer, Berlin, Heidelberg"},{"key":"1261_CR18","doi-asserted-by":"publisher","first-page":"17578","DOI":"10.1109\/ACCESS.2019.2895302","volume":"7","author":"P Fraga-Lamas","year":"2019","unstructured":"Fraga-Lamas, P., & Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). A Review on Blockchain Technologies for an Advanced and Cyber-Resilient Automotive Industry. IEEE Access, 7, 17578-17598.","journal-title":"IEEE Access"},{"key":"1261_CR19","unstructured":"Glaser, F. (2017) Pervasive decentralisation of digital infrastructures: a framework for blockchain enabled system and use case analysis. In HICSS 2017 Proceedings, pp. 1543\u20131552. https:\/\/doi.org\/10.1145\/1235"},{"key":"1261_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2018.03.005","author":"F Hawlitschek","year":"2018","unstructured":"Hawlitschek, F., Notheisen, B., Teubner, T.: The limits of trust-free systems: a literature review on blockchain technology and trust in the sharing economy. Electron. Commer. Res. Appl. 29 (2018). https:\/\/doi.org\/10.1016\/j.elerap.2018.03.005","journal-title":"Electron. Commer. Res. Appl."},{"key":"1261_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/logistics3010005","author":"A Litke","year":"2019","unstructured":"Litke, A., Anagnostopoulos, D., Varvarigou, T.: Blockchains for supply chain management: architectural elements and challenges towards a global scale deployment. Logistics 3(1) (2019). https:\/\/doi.org\/10.3390\/logistics3010005","journal-title":"Logistics"},{"key":"1261_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-99127-6","volume-title":"PRO-VE 2018. IAICT, vol. 534","author":"H Schaffers","year":"2018","unstructured":"Schaffers, H.: The relevance of blockchain for collaborative networked organizations. In: Camarinha-Matos, L.M., Afsarmanesh, H., Rezgui, Y. (eds.) PRO-VE 2018. IAICT, vol. 534, pp. 3\u201317. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99127-6 1"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1261-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-020-1261-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1261-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T01:09:21Z","timestamp":1615856961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-020-1261-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1261"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1261-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"16 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}