{"date_created":"2018-11-14T15:43:13Z","file_date_updated":"2018-12-13T15:12:17Z","oa":"1","has_accepted_license":"1","file":[{"date_updated":"2018-12-13T15:12:17Z","date_created":"2018-12-07T12:01:06Z","file_size":203924,"creator":"hsiemes","content_type":"application/pdf","access_level":"open_access","relation":"main_file","file_id":"6050","file_name":"pik-2013-0015.pdf"}],"page":"153-159","issue":"3","ddc":["000"],"citation":{"chicago":"Meer, Hermann de, Michael Diener, Ralph Herkenhöner, Markus Kucera, Michael Niedermeier, Andreas Reisser, Guido Schryen, Michael Vetter, Thomas Waas, and Emrah Yasasin. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36, no. 3 (2013): 153–59.","short":"H. de Meer, M. Diener, R. Herkenhöner, M. Kucera, M. Niedermeier, A. Reisser, G. Schryen, M. Vetter, T. Waas, E. Yasasin, PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36 (2013) 153–159.","apa":"de Meer, H., Diener, M., Herkenhöner, R., Kucera, M., Niedermeier, M., Reisser, A., … Yasasin, E. (2013). Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis Der Informationsverarbeitung Und Kommunikation, 36(3), 153–159.","bibtex":"@article{de Meer_Diener_Herkenhöner_Kucera_Niedermeier_Reisser_Schryen_Vetter_Waas_Yasasin_2013, title={Sicherheitsherausforderungen in hochverteilten Systemen}, volume={36}, number={3}, journal={PIK - Praxis der Informationsverarbeitung und Kommunikation}, publisher={de Gruyter}, author={de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}, year={2013}, pages={153–159} }","mla":"de Meer, Hermann, et al. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation, vol. 36, no. 3, de Gruyter, 2013, pp. 153–59.","ama":"de Meer H, Diener M, Herkenhöner R, et al. Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis der Informationsverarbeitung und Kommunikation. 2013;36(3):153-159.","ieee":"H. de Meer et al., “Sicherheitsherausforderungen in hochverteilten Systemen,” PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 36, no. 3, pp. 153–159, 2013."},"user_id":"61579","department":[{"_id":"277"}],"_id":"5682","title":"Sicherheitsherausforderungen in hochverteilten Systemen","volume":36,"extern":"1","author":[{"first_name":"Hermann","last_name":"de Meer","full_name":"de Meer, Hermann"},{"first_name":"Michael","full_name":"Diener, Michael","last_name":"Diener"},{"last_name":"Herkenhöner","full_name":"Herkenhöner, Ralph","first_name":"Ralph"},{"first_name":"Markus","full_name":"Kucera, Markus","last_name":"Kucera"},{"first_name":"Michael","last_name":"Niedermeier","full_name":"Niedermeier, Michael"},{"last_name":"Reisser","full_name":"Reisser, Andreas","first_name":"Andreas"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"first_name":"Michael","last_name":"Vetter","full_name":"Vetter, Michael"},{"first_name":"Thomas","full_name":"Waas, Thomas","last_name":"Waas"},{"first_name":"Emrah","full_name":"Yasasin, Emrah","last_name":"Yasasin"}],"publisher":"de Gruyter","intvolume":" 36","status":"public","year":"2013","publication":"PIK - Praxis der Informationsverarbeitung und Kommunikation","type":"journal_article","date_updated":"2022-01-06T07:02:32Z","language":[{"iso":"eng"}]}