{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T05:52:29Z","timestamp":1695275549200},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11623-023-1832-7","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:01:46Z","timestamp":1695200506000},"page":"623-628","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Souver\u00e4ne Sicherheit, Zero Trust und das Datenschutzrecht"],"prefix":"10.1007","volume":"47","author":[{"given":"Marit","family":"Hansen","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Probst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"1832_CR1","unstructured":"BSI (2022): Die Lage der IT-Sicherheit in Deutschland 2022, https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Publikationen\/Lagebericht\/lagebericht_node.html"},{"key":"1832_CR2","unstructured":"Kompetenzzentrum \u00d6ffentliche IT (\u00d6FIT) (2017): Digitale Souver\u00e4nit\u00e4t, https:\/\/www.oeffentliche-it.de\/publikationen?doc=71579&title=Digitale+Souver\u00e4nit\u00e4t."},{"key":"1832_CR3","unstructured":"Konferenz der unabh\u00e4ngigen Datenschutzaufsichtsbeh\u00f6rden des Bundes und der L\u00e4nder (2023): Kriterien f\u00fcr Souver\u00e4ne Clouds, Positionspapier vom 11.05.2023, https:\/\/datenschutzkonferenz-online.de\/media\/weitere_dokumente\/2023-05-11_DSK-Positionspapier_Kritierien-Souv-Clouds.pdf."},{"key":"1832_CR4","unstructured":"Eckhardt (2023): Sicherheit der Verarbeitung: Der Zweck heiligt nicht die Mittel!, Datenschutz PRAXIS, Heft August, 2023 (im Erscheinen)."},{"key":"1832_CR5","unstructured":"Eckhardt, Hansen (2023): Datenschutzrechtliche Verkehrssicherungspflicht \u2013 ein Novum? BvD-NEWS 2\/2023, 20-25."},{"key":"1832_CR6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207","author":"NIST","year":"2020","unstructured":"NIST (2020): Zero Trust Architecture, NIST Special Publication 800-207, 2020. https:\/\/doi.org\/10.6028\/NIST.SP.800-207.","journal-title":"NIST Special Publication"},{"key":"1832_CR7","unstructured":"Microsoft (2021): Evolving Zero Trust \u2013 How real-world deployments and attacks are shaping the future of Zero Trust strategies, November 2021, https:\/\/www.microsoft.com\/de-de\/security\/business\/zero-trust."},{"issue":"46","key":"1832_CR8","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/s11623-022-1583-x","volume":"3","author":"Fox","year":"2022","unstructured":"Fox (2022): Zero Trust, DuD (46) 3, 174-175.","journal-title":"DuD"},{"key":"1832_CR9","unstructured":"Artikel 29-Datenschutzgruppe (2014): Stellungnahme 06\/2014 zum Begriff des berechtigten Interesses des f\u00fcr die Verarbeitung Verantwortlichen gem\u00e4\u00df Artikel 7 der Richtlinie 95\/46\/EG, angenommen am 9. April 2014, WP 217."},{"key":"1832_CR10","unstructured":"DSK (2020): Standard-Datenschutzmodell, Baustein \u201eProtokollieren\u201c, Version 1.0a, https:\/\/www.datenschutz-mv.de\/static\/DS\/Dateien\/Datenschutzmodell\/Bausteine\/SDM-V2.0_Protokollieren_V1.0a.pdf."},{"issue":"1","key":"1832_CR11","first-page":"23","volume":"20","author":"P Huhn","year":"1996","unstructured":"Huhn, Pfitzmann (1996): Technische Randbedingungen jeder Kryptoregulierung, DuD (20) 1, 23-26.","journal-title":"DuD"},{"key":"1832_CR12","unstructured":"EDSA, EDPS (2022): Gemeinsame Stellungnahme 4\/2022zu dem Vorschlag f\u00fcr eine Verordnung des Europ\u00e4ischen Parlaments und des Rates zur Festlegung von Vorschriften zur Pr\u00e4vention und Bek\u00e4mpfung des sexuellen Missbrauchs von Kindern, angenommen am 28. Juli 2022."},{"key":"1832_CR13","unstructured":"Richtlinie zur Nutzung von Internet und E-Mail, 2021, Amtsbl. SH 2021, 39, https:\/\/www.gesetze-rechtsprechung.sh.juris.de\/perma?j=VVSH-2015.20-MELUND-20201221-SF."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1832-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-023-1832-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-023-1832-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T09:35:44Z","timestamp":1695202544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-023-1832-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":13,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1832"],"URL":"https:\/\/doi.org\/10.1007\/s11623-023-1832-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"20 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}