
{  
   "types" : {
      "Bookmark" : {
         "pluralLabel" : "Bookmarks"
      },
      "Publication" : {
         "pluralLabel" : "Publications"
      },
      "GoldStandardPublication" : {
         "pluralLabel" : "GoldStandardPublications"
      },
      "GoldStandardBookmark" : {
         "pluralLabel" : "GoldStandardBookmarks"
      },
      "Tag" : {
         "pluralLabel" : "Tags"
      },
      "User" : {
         "pluralLabel" : "Users"
      },
      "Group" : {
         "pluralLabel" : "Groups"
      },
      "Sphere" : {
         "pluralLabel" : "Spheres"
      }
   },
   
   "properties" : {
      "count" : {
         "valueType" : "number"
      },
      "date" : {
         "valueType" : "date"
      },
      "changeDate" : {
         "valueType" : "date"
      },
      "url" : {
         "valueType" : "url"
      },
      "id" : {
         "valueType" : "url"
      },
      "tags" : {
         "valueType" : "item"
      },
      "user" : {
         "valueType" : "item"
      }      
   },
   
   "items" : [
   	  
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/9f5174deb96f74b7ef54324ecd645f7c/droessler",
         "tags" : [
            "cloud","computer","internet","nextcloud","owncloud"
         ],
         
         "intraHash" : "9f5174deb96f74b7ef54324ecd645f7c",
         "label" : "Nextcloud",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-06-18 13:16:44",
         "changeDate" : "2016-06-18 11:16:44",
         "count" : 1,
         "url" : "https://nextcloud.com/"

      }
,
	  {  
         "type" : "Bookmark",
         "id"   : "https://puma.ub.uni-stuttgart.de/url/7810e31b91299d68336bb65d4912d314/droessler",
         "tags" : [
            "computer","datenschutz","internet","owncloud","server","spreedbox","videokonferenz"
         ],
         
         "intraHash" : "7810e31b91299d68336bb65d4912d314",
         "label" : "Spreed.ME \u2013 Spreedbox",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-06-18 13:12:54",
         "changeDate" : "2016-06-18 11:12:54",
         "count" : 1,
         "url" : "https://www.spreed.me/spreedbox/?lang=de"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2f3eeb74bb9640ea7d6088d6eadd3503b/segger",         
         "tags" : [
            "(cs.NI),","Architecture","Computer","FOS:","Internet","Networking","and","information","sciences","sciences,"
         ],
         
         "intraHash" : "f3eeb74bb9640ea7d6088d6eadd3503b",
         "interHash" : "a18d9063a6129d31b62e71a220b04ad9",
         "label" : "End-to-End Reliability in Wireless IEEE 802.1Qbv Time-Sensitive Networks",
         "user" : "segger",
         "description" : "",
         "date" : "2025-06-11 09:12:35",
         "changeDate" : "2025-06-11 09:12:35",
         "count" : 2,
         "pub-type": "misc",
         "publisher":"arXiv",
         "year": "2025", 
         "url": "https://arxiv.org/abs/2502.11595", 
         
         "author": [ 
            "S. Egger","J. Gross","J. Sachs","G. P. Sharma","C. Becker","F. Dürr"
         ],
         "authors": [
         	
            	{"first" : "S.",	"last" : "Egger"},
            	{"first" : "J.",	"last" : "Gross"},
            	{"first" : "J.",	"last" : "Sachs"},
            	{"first" : "G. P.",	"last" : "Sharma"},
            	{"first" : "C.",	"last" : "Becker"},
            	{"first" : "F.",	"last" : "Dürr"}
         ],
         
         "copyright" : "Creative Commons Attribution 4.0 International",
         
         "doi" : "10.48550/ARXIV.2502.11595",
         
         "bibtexKey": "https://doi.org/10.48550/arxiv.2502.11595"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2c60be44d82749ddbb7d52414a44eeae7/hgeppert",         
         "tags" : [
            "(cs.NI),","Networking","Architecture","and","C.2.5","Computer","C.2.3;","Internet","sciences,","information","FOS:"
         ],
         
         "intraHash" : "c60be44d82749ddbb7d52414a44eeae7",
         "interHash" : "2a96e32ad96a958eaef70153a449adff",
         "label" : "Just a Second -- Scheduling Thousands of Time-Triggered Streams in Large-Scale Networks",
         "user" : "hgeppert",
         "description" : "",
         "date" : "2024-11-20 14:36:58",
         "changeDate" : "2024-11-20 14:36:58",
         "count" : 1,
         "pub-type": "misc",
         "publisher":"arXiv",
         "year": "2023", 
         "url": "https://arxiv.org/abs/2306.07710", 
         
         "author": [ 
            "Heiko Geppert","Frank Dürr","Sukanya Bhowmik","Kurt Rothermel"
         ],
         "authors": [
         	
            	{"first" : "Heiko",	"last" : "Geppert"},
            	{"first" : "Frank",	"last" : "Dürr"},
            	{"first" : "Sukanya",	"last" : "Bhowmik"},
            	{"first" : "Kurt",	"last" : "Rothermel"}
         ],
         
         "copyright" : "Creative Commons Attribution 4.0 International",
         
         "doi" : "10.48550/ARXIV.2306.07710",
         
         "bibtexKey": "https://doi.org/10.48550/arxiv.2306.07710"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2bc16e9af554fddff554b90bee4fae2c9/hgeppert",         
         "tags" : [
            "Networking","C.2.1;","Architecture","C.3","sciences,","FOS:","(cs.NI),","and","Computer","C.2.3;","Internet","information"
         ],
         
         "intraHash" : "bc16e9af554fddff554b90bee4fae2c9",
         "interHash" : "ea954fc13f1b22716af6fa873ef17153",
         "label" : "Efficient Conflict Graph Creation for Time-Sensitive Networks with Dynamically Changing Communication Demands",
         "user" : "hgeppert",
         "description" : "",
         "date" : "2024-11-20 14:36:58",
         "changeDate" : "2024-11-20 14:36:58",
         "count" : 2,
         "pub-type": "misc",
         "publisher":"arXiv",
         "year": "2024", 
         "url": "https://arxiv.org/abs/2411.01902", 
         
         "author": [ 
            "Heiko Geppert","Frank Dürr","Kurt Rothermel"
         ],
         "authors": [
         	
            	{"first" : "Heiko",	"last" : "Geppert"},
            	{"first" : "Frank",	"last" : "Dürr"},
            	{"first" : "Kurt",	"last" : "Rothermel"}
         ],
         
         "copyright" : "Creative Commons Attribution 4.0 International",
         
         "doi" : "10.48550/ARXIV.2411.01902",
         
         "bibtexKey": "https://doi.org/10.48550/arxiv.2411.01902"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/2686d595ee1375c91097b0ba2adf4ff9d/droessler",         
         "tags" : [
            "computer","internet","it","it-sicherheit","passwort","passwörter","sicherheit","verschlüsselung"
         ],
         
         "intraHash" : "686d595ee1375c91097b0ba2adf4ff9d",
         "interHash" : "f8ab3b2dbd8c9b582ec76e7c2d208ac5",
         "label" : "IT-Sicherheit: Sogar \"ji32k7au4a83\" ist ein mieses Passwort",
         "user" : "droessler",
         "description" : "",
         "date" : "2019-03-11 17:14:17",
         "changeDate" : "2019-03-11 16:14:17",
         "count" : 1,
         "pub-type": "article",
         "journal": "Süddeutsche Zeitung",
         "year": "2019", 
         "url": "https://www.sueddeutsche.de/digital/sichere-passwoerter-jikaua-1.4355234", 
         
         "author": [ 
            "Simon Hurtz"
         ],
         "authors": [
         	
            	{"first" : "Simon",	"last" : "Hurtz"}
         ],
         
         "bibtexKey": "hurtz2019itsicherheit"

      }
,
      {
         "type" : "Publication",
         "id"   : "https://puma.ub.uni-stuttgart.de/bibtex/23baccbb4c6821be7be734ad05c7a48df/droessler",         
         "tags" : [
            "computer","datensicherheit","internet","passwort","passwörter","sicherheit","software"
         ],
         
         "intraHash" : "3baccbb4c6821be7be734ad05c7a48df",
         "interHash" : "eba9b6a7301d3a60d084a379785454f5",
         "label" : "Warum es keine gute Idee ist, Passwörter regelmäßig zu ändern",
         "user" : "droessler",
         "description" : "",
         "date" : "2016-08-03 23:45:26",
         "changeDate" : "2016-11-25 10:30:24",
         "count" : 1,
         "pub-type": "article",
         "journal": "Süddeutsche Zeitung",
         "year": "2016", 
         "url": "http://www.sueddeutsche.de/digital/2.220/it-sicherheit-warum-es-keine-gute-idee-ist-passwoerter-regelmaessig-zu-aendern-1.3106648", 
         
         "author": [ 
            "Simon Hurtz"
         ],
         "authors": [
         	
            	{"first" : "Simon",	"last" : "Hurtz"}
         ],
         
         "timestamp" : "2016-08-03 11:45:26",
         
         "username" : "droessler",
         
         "intrahash" : "3baccbb4c6821be7be734ad05c7a48df",
         
         "file" : ":2016-08-03_passwörter.pdf:PDF",
         
         "interhash" : "eba9b6a7301d3a60d084a379785454f5",
         
         "groups" : "public",
         
         "bibtexKey": "Hurtz2016"

      }
	  
   ]
}
