{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T14:59:34Z","timestamp":1708441174660},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11623-020-1304-2","type":"journal-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T09:04:01Z","timestamp":1592211841000},"page":"451-455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Root-of-Trust-Architekturen als Open-Source-Hardware und deren Zertifizierung"],"prefix":"10.1007","volume":"44","author":[{"given":"Felix","family":"Miller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"1304_CR1","unstructured":"GlobalPlatform: Root of Trust Definitions and Requirements Version 1.1. Online: www.globalplatform.org"},{"key":"1304_CR2","unstructured":"Eurosmart: Security IC Platform Protection Profile with Augmentation Packages. Online: www.commoncriteriaportal.org\/pps\/"},{"key":"1304_CR3","unstructured":"ESET Research Whitepapers: LOJAX First UEFI rootkit found in the wild. Online: welivesecurity.com\/wp-content\/uploads\/2018\/09\/ESET-LoJax.pdf"},{"key":"1304_CR4","unstructured":"Intel: Intel Hardware-based Security Technologies for Intelligent Retail Devices. Online: https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/security-technologies-4th-gen-core-retail-paper.pdf"},{"key":"1304_CR5","unstructured":"securityweek: Flawed BIOS Implementations Lead to Intel Boot Guard Bypass. Online: https:\/\/www.securityweek.com\/flawed-bios-implementations-lead-intel-boot-guard-bypass"},{"key":"1304_CR6","unstructured":"Google Cloud Blog: Titan in depth: Security in plaintext. Online: https:\/\/cloud.google.com\/blog\/products\/gcp\/titan-in-depth-security-in-plaintext"},{"key":"1304_CR7","unstructured":"Microsoft Azure https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-creates-industry-standards-for-datacenter-hardware-storage-and-security\/ Online: https:\/\/azure.microsoft.com\/en-us\/blog\/microsoft-creates-industry-standards-for-datacenter-hardware-storage-and-security\/"},{"key":"1304_CR8","unstructured":"OpenTitan: Projekt-Webseite. Online: www.opentitan.org"},{"key":"1304_CR9","unstructured":"Raspberry Pi Webseite. Online: https:\/\/www.raspberrypi.org\/"},{"key":"1304_CR10","unstructured":"FreePDK45: Online: https:\/\/www.eda.ncsu.edu\/wiki\/FreePDK45:Contents"},{"key":"1304_CR11","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/s11623-014-0096-7","volume":"38","author":"T Gustavsson","year":"2014","unstructured":"Gustavsson, T. Common Criteria and Open Source. Datenschutz Datensich 38, 226\u2013231 (2014). https:\/\/doi.org\/10.1007\/s11623-014-0096-7","journal-title":"Datenschutz Datensich"},{"key":"1304_CR12","unstructured":"SOG-IS\/JIL: Application of Attack Potential to Smartcards and Similar Devices. Online: https:\/\/www.sogis.eu\/documents\/cc\/domains\/sc\/JIL-Application-of-Attack-Potential-to-Smartcards-v3-0.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1304-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-020-1304-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1304-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T23:36:11Z","timestamp":1623713771000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-020-1304-2"}},"subtitle":["am Beispiel von OpenTitan"],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["1304"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1304-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"15 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}