{"_id":"5682","user_id":"61579","issue":"3","type":"journal_article","extern":"1","ddc":["000"],"department":[{"_id":"277"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:32Z","title":"Sicherheitsherausforderungen in hochverteilten Systemen","publisher":"de Gruyter","volume":36,"status":"public","year":"2013","file_date_updated":"2018-12-13T15:12:17Z","has_accepted_license":"1","date_created":"2018-11-14T15:43:13Z","intvolume":" 36","page":"153-159","publication":"PIK - Praxis der Informationsverarbeitung und Kommunikation","author":[{"last_name":"de Meer","full_name":"de Meer, Hermann","first_name":"Hermann"},{"full_name":"Diener, Michael","last_name":"Diener","first_name":"Michael"},{"last_name":"Herkenhöner","full_name":"Herkenhöner, Ralph","first_name":"Ralph"},{"full_name":"Kucera, Markus","last_name":"Kucera","first_name":"Markus"},{"full_name":"Niedermeier, Michael","last_name":"Niedermeier","first_name":"Michael"},{"full_name":"Reisser, Andreas","last_name":"Reisser","first_name":"Andreas"},{"first_name":"Guido","id":"72850","full_name":"Schryen, Guido","last_name":"Schryen"},{"first_name":"Michael","full_name":"Vetter, Michael","last_name":"Vetter"},{"last_name":"Waas","full_name":"Waas, Thomas","first_name":"Thomas"},{"first_name":"Emrah","last_name":"Yasasin","full_name":"Yasasin, Emrah"}],"oa":"1","file":[{"file_name":"pik-2013-0015.pdf","file_size":203924,"file_id":"6050","relation":"main_file","content_type":"application/pdf","access_level":"open_access","date_created":"2018-12-07T12:01:06Z","date_updated":"2018-12-13T15:12:17Z","creator":"hsiemes"}],"citation":{"short":"H. de Meer, M. Diener, R. Herkenhöner, M. Kucera, M. Niedermeier, A. Reisser, G. Schryen, M. Vetter, T. Waas, E. Yasasin, PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36 (2013) 153–159.","chicago":"Meer, Hermann de, Michael Diener, Ralph Herkenhöner, Markus Kucera, Michael Niedermeier, Andreas Reisser, Guido Schryen, Michael Vetter, Thomas Waas, and Emrah Yasasin. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation 36, no. 3 (2013): 153–59.","apa":"de Meer, H., Diener, M., Herkenhöner, R., Kucera, M., Niedermeier, M., Reisser, A., … Yasasin, E. (2013). Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis Der Informationsverarbeitung Und Kommunikation, 36(3), 153–159.","mla":"de Meer, Hermann, et al. “Sicherheitsherausforderungen in Hochverteilten Systemen.” PIK - Praxis Der Informationsverarbeitung Und Kommunikation, vol. 36, no. 3, de Gruyter, 2013, pp. 153–59.","ama":"de Meer H, Diener M, Herkenhöner R, et al. Sicherheitsherausforderungen in hochverteilten Systemen. PIK - Praxis der Informationsverarbeitung und Kommunikation. 2013;36(3):153-159.","bibtex":"@article{de Meer_Diener_Herkenhöner_Kucera_Niedermeier_Reisser_Schryen_Vetter_Waas_Yasasin_2013, title={Sicherheitsherausforderungen in hochverteilten Systemen}, volume={36}, number={3}, journal={PIK - Praxis der Informationsverarbeitung und Kommunikation}, publisher={de Gruyter}, author={de Meer, Hermann and Diener, Michael and Herkenhöner, Ralph and Kucera, Markus and Niedermeier, Michael and Reisser, Andreas and Schryen, Guido and Vetter, Michael and Waas, Thomas and Yasasin, Emrah}, year={2013}, pages={153–159} }","ieee":"H. de Meer et al., “Sicherheitsherausforderungen in hochverteilten Systemen,” PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 36, no. 3, pp. 153–159, 2013."}}