Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud36.bht:"
@article{DBLP:journals/dud/AchtenP12, author = {Oliver M. Achten and Norbert Pohlmann}, title = {Sichere Apps - Vision oder Realit{\"{a}}t?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {161--164}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0057-y}, doi = {10.1007/S11623-012-0057-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AchtenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AlkassarSS12, author = {Ammar Alkassar and Steffen Schulz and Christian St{\"{u}}ble}, title = {Sicherheitskern(e) f{\"{u}}r Smartphones: Ans{\"{a}}tze und L{\"{o}}sungen - Vom Mikrokern bis zu Capabilities - Verschiedene L{\"{o}}sungsans{\"{a}}tze f{\"{u}}r die App-Trennung und -Kontrolle}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {175--179}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0060-3}, doi = {10.1007/S11623-012-0060-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AlkassarSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Alsbih12, author = {Amir Alsbih}, title = {Ein praktischer Weg zur Sicherheit von Eigenentwicklungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {241--245}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0092-8}, doi = {10.1007/S11623-012-0092-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Alsbih12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/AmmannS12, author = {Franz{-}Ernst Ammann and Aleksandra Sowa}, title = {Systematische Entwicklung von Metriken zur Beurteilung der Datensicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {247--251}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0093-7}, doi = {10.1007/S11623-012-0093-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/AmmannS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BackerDFS12, author = {Matthias B{\"{a}}cker and Andreas Dewald and Felix C. Freiling and Sven Schmitt}, title = {Kriterien f{\"{u}}r die Priorisierung bei der Sicherung und Analyse digitaler Spuren}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {597--602}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0187-2}, doi = {10.1007/S11623-012-0187-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BackerDFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bitz12, author = {Gunter Bitz}, title = {Das Jahr der Hacks}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {625}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0213-4}, doi = {10.1007/S11623-012-0213-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bitz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BockM12, author = {Kirsten Bock and Sebastian Meissner}, title = {Datenschutz-Schutzziele im Recht - Zum normativen Gehalt der Datenschutz-Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {425--431}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0152-0}, doi = {10.1007/S11623-012-0152-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BockM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Boehm12, author = {Franziska Boehm}, title = {Data processing and law enforcement access to information systems at {EU} level - No consistent framework in spite of the envisaged data protection reform}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {339--343}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0131-5}, doi = {10.1007/S11623-012-0131-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Boehm12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BraunGHMS12, author = {Bastian Braun and Patrick Gemein and Benedikt H{\"{o}}fling and Michael Marc Maisch and Alexander Seidl}, title = {Angriffe auf OpenID und ihre strafrechtliche Bewertung - Cross Site Request Forgery, Phishing und Clickjacking}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {502--509}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0168-5}, doi = {10.1007/S11623-012-0168-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BraunGHMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brunst12, author = {Phillip Brunst}, title = {Staatliche (Anti-)Krypto-Strategien - Kryptographie zwischen B{\"{u}}rgerrecht und Bedrohung der nationalen Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {333--338}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0130-6}, doi = {10.1007/S11623-012-0130-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brunst12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner12, author = {Benedikt Buchner}, title = {Facebook {\&} Co}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {705}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0234-z}, doi = {10.1007/S11623-012-0234-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner12a, author = {Benedikt Buchner}, title = {Inhaltsdaten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {767}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0246-8}, doi = {10.1007/S11623-012-0246-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caspar12, author = {Johannes Caspar}, title = {Zwischen Aufbau und Ausverkauf - Europas Zwiespalt in Sachen Datenschutz vor dem Hintergrund der Fluggastdaten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {478}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0163-x}, doi = {10.1007/S11623-012-0163-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caspar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DesoiJ12, author = {Monika Desoi and Silke Jandt}, title = {Zul{\"{a}}ssige Erhebung von Daten zu Forschungszwecken}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {895--901}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0298-9}, doi = {10.1007/S11623-012-0298-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DesoiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Detken12, author = {Kai{-}Oliver Detken}, title = {Unternehmensnetzwerke sch{\"{u}}tzen und dennoch mobiles Potential nutzen - M{\"{o}}gliche Bedrohungen und Sicherheitsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {169--174}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0059-9}, doi = {10.1007/S11623-012-0059-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Detken12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dittmayer12, author = {Matthias Dittmayer}, title = {Fallstricke f{\"{u}}r Blogger - Datenschutz bei Telemedien}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {526--530}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0172-9}, doi = {10.1007/S11623-012-0172-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dittmayer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix12, author = {Alexander Dix}, title = {Datenschutzaufsicht im Bundesstaat - ein Vorbild f{\"{u}}r Europa}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {318--321}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0127-1}, doi = {10.1007/S11623-012-0127-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dix12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DriessenP12, author = {Benedikt Driessen and Christof Paar}, title = {Angriff auf Thuraya Satellitentelefonie}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {886--890}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0296-y}, doi = {10.1007/S11623-012-0296-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DriessenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EDPS12, title = {European Data Protection Supervisor {(EDPS):} Inventory 2012 - Towards a more strategic approach to legislative consultation}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {201--203}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0086-6}, doi = {10.1007/S11623-012-0086-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EDPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eckert12, author = {Claudia Eckert}, title = {Embedded systems security}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {861}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0289-x}, doi = {10.1007/S11623-012-0289-X}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Eckert12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Eiermann12, author = {Helmut Eiermann}, title = {Das IT-Grundrecht und seine Folgen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {452}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0156-9}, doi = {10.1007/S11623-012-0156-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Eiermann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ertel12, author = {Sebastian Ertel}, title = {Das Fragerecht des Arbeitgebers}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {126--131}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0030-9}, doi = {10.1007/S11623-012-0030-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ertel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Faludi12, author = {Gabor Faludi}, title = {How not to turn a blind eye - Challenges in ensuring security with Enterprise-scale software development}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {635--640}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0217-0}, doi = {10.1007/S11623-012-0217-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Faludi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FenzlK12, author = {Thomas Fenzl and Christian Kollmitzer}, title = {Usability gesichtserkennungsbasierter Authentifizierung - Ergebnisse eines Feldtests}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {497--501}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0167-6}, doi = {10.1007/S11623-012-0167-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FenzlK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox12, author = {Dirk Fox}, title = {Untragbar unertr{\"{a}}glich}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0001-1}, doi = {10.1007/S11623-012-0001-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox12a, author = {Dirk Fox}, title = {Hypervisor}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {54}, year = {2012}, url = {http://www.springerlink.com/content/r81818287r155706/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Fox12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox12b, author = {Dirk Fox}, title = {Neue Priorit{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {225}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0087-5}, doi = {10.1007/S11623-012-0087-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox12c, author = {Dirk Fox}, title = {Captcha}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {531}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0173-8}, doi = {10.1007/S11623-012-0173-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox12d, author = {Dirk Fox}, title = {Cross Site Scripting {(XSS)}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {840}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0284-2}, doi = {10.1007/S11623-012-0284-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Franzen12, author = {Martin Franzen}, title = {Der Vorschlag f{\"{u}}r eine EU-Datenschutz-Grundverordnung und der Arbeitnehmer datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {322--326}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0128-0}, doi = {10.1007/S11623-012-0128-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Franzen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gaycken12, author = {Sandro Gaycken}, title = {Does not compute - old security vs new threats}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {666--669}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0223-2}, doi = {10.1007/S11623-012-0223-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gaycken12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gebauer12, author = {Joachim Gebauer}, title = {Code Signing - Programme als vertrauensw{\"{u}}rdig kennzeichnen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {684}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0227-y}, doi = {10.1007/S11623-012-0227-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gebauer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gerhager12, author = {Stephan Gerhager}, title = {Informationssicherheit im zuk{\"{u}}nftigen Smart Grid}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {445--451}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0155-x}, doi = {10.1007/S11623-012-0155-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gerhager12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gimmler12, author = {Roland Gimmler}, title = {Medienkompetenz und Datenschutzkompetenz in der Schule}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {110--116}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0027-4}, doi = {10.1007/S11623-012-0027-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gimmler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Glemser12, author = {Tobias Glemser}, title = {{OWASP} und das deutsche Chapter}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {795--796}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0273-5}, doi = {10.1007/S11623-012-0273-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Glemser12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grimm12, author = {R{\"{u}}diger Grimm}, title = {Datenschutz als Bildungsaufgabe}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {77}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0019-4}, doi = {10.1007/S11623-012-0019-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Grimm12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grimm12a, author = {R{\"{u}}diger Grimm}, title = {Spuren im Netz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {88--91}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0023-8}, doi = {10.1007/S11623-012-0023-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Grimm12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grussen12, author = {Ihr Gr{\"{u}}{\ss}en}, title = {Distanz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {629}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0214-3}, doi = {10.1007/S11623-012-0214-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Grussen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hallermann12, author = {Ulrich Hallermann}, title = {Wann ist der Datenschutzbeauftragte fachkundig und unabh{\"{a}}ngig? - Zum Beschluss des D{\"{u}}sseldorfer Kreises vom 25. November 2010}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {122--125}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0029-2}, doi = {10.1007/S11623-012-0029-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hallermann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hamdy12, author = {Safuat Hamdy}, title = {Der {OWASP} Application Security Verification Standard}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {797--800}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0274-4}, doi = {10.1007/S11623-012-0274-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hamdy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen12, author = {Marit Hansen}, title = {Vertraulichkeit und Integrit{\"{a}}t von Daten und IT-Systemen im Cloud-Zeitalter}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {407--412}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0149-8}, doi = {10.1007/S11623-012-0149-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HansenT12, author = {Marit Hansen and Christian Thiel}, title = {Cyber-Physical Systems und Privatsph{\"{a}}renschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {26--30}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0007-8}, doi = {10.1007/S11623-012-0007-8}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HansenT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hasse12, author = {Lutz Hasse}, title = {Umsetzung der "Orientierungshilfe Krankenhausinformationssysteme" in Th{\"{u}}ringen - Gemeinsame Informationsveranstaltung des Th{\"{u}}ringer Landesbeauftragten f{\"{u}}r den Datenschutz und der Landeskrankenhausgesellschaft Th{\"{u}}ringen e. {V}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {560}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0179-2}, doi = {10.1007/S11623-012-0179-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hasse12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Heider12, author = {Jens Heider}, title = {Verantwortung: Smartphone}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {149}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0053-2}, doi = {10.1007/S11623-012-0053-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Heider12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeiderK12, author = {Jens Heider and Rachid El Khayari}, title = {Geht Ihr Smartphone fremd? - {\"{U}}bersicht der Angriffsvektoren f{\"{u}}r Ger{\"{a}}te im Unternehmenseinsatz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {155--160}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0056-z}, doi = {10.1007/S11623-012-0056-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeiderK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hemker12, author = {Thomas Hemker}, title = {"Ich brauche das!" - Mobile Ger{\"{a}}te im Unternehmenseinsatz - {\"{U}}bersicht {\"{u}}ber die Bedrohungslage und die Schutzma{\ss}nahmen f{\"{u}}r die Verwendung gesch{\"{a}}ftlicher Daten auf (privaten) mobilen Ger{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {165--168}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0058-x}, doi = {10.1007/S11623-012-0058-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hemker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Henking12, author = {Tanja Henking}, title = {Schwerwiegende Verletzung des Pers{\"{o}}nlichkeitsrechts durch HIV-Testung ohne Einwilligung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {823--824}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0280-6}, doi = {10.1007/S11623-012-0280-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Henking12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HessS12, author = {Thomas Hess and Michel Schreiner}, title = {{\"{O}}konomie der Privatsph{\"{a}}re - Eine Ann{\"{a}}herung aus drei Perspektiven}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {105--109}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0026-5}, doi = {10.1007/S11623-012-0026-5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HessS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HohnePS12, author = {Focke H{\"{o}}hne and Henrich Christopher P{\"{o}}hls and Kai Samelin}, title = {Rechtsfolgen editierbarer Signaturen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {485--491}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0165-8}, doi = {10.1007/S11623-012-0165-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HohnePS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HornungF12, author = {Gerrit Hornung and Katharina Fuchs}, title = {Nutzerdaten im Smart Grid - zur Notwendigkeit einer differenzierten grundrechtlichen Bewertung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {20--25}, year = {2012}, url = {http://www.springerlink.com/content/787h211k388g1372/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/HornungF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HornungHH12, author = {Gerrit Hornung and Moritz Horsch and Detlef H{\"{u}}hnlein}, title = {Mobile Authentisierung und Signatur mit dem neuen Personalausweis - Innovative technische und rechtliche L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {189--194}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0063-0}, doi = {10.1007/S11623-012-0063-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HornungHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Iraschko-LuscherK12, author = {Stephanie Iraschko{-}Luscher and Pia Kiekenbeck}, title = {Bezahlm{\"{o}}glichkeiten im Internet - schnell, sicher und datenschutzkonform?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {902--906}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0299-8}, doi = {10.1007/S11623-012-0299-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Iraschko-LuscherK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jaspers12, author = {Andreas Jaspers}, title = {Die EU-Datenschutz-Grundverordnung - Auswirkungen der EU-Datenschutz-Grundverordnung auf die Datenschutzorganisation des Unternehmens}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {571--575}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0182-7}, doi = {10.1007/S11623-012-0182-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jaspers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jendrian12, author = {Kai Jendrian}, title = {Sicherheit als Qualit{\"{a}}tsmerkmal mit OpenSAMM}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {270--273}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0097-3}, doi = {10.1007/S11623-012-0097-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jendrian12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jendrian12a, author = {Kai Jendrian}, title = {Divide et impera!}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {789}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0270-8}, doi = {10.1007/S11623-012-0270-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jendrian12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JensenJIMS12, author = {Meiko Jensen and Holger Junker and Luigi Lo Iacono and Christian Mainka and J{\"{o}}rg Schwenk}, title = {{XML} Signature Wrapping Angriffe wirksam unterbinden}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {236--240}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0091-9}, doi = {10.1007/S11623-012-0091-9}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JensenJIMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Johannes12, author = {Paul C. Johannes}, title = {Das Recht des Forschers auf Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {817--822}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0279-z}, doi = {10.1007/S11623-012-0279-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Johannes12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Johns12, author = {Martin Johns}, title = {HTML5-Security - Sicherer Umgang mit den neuen JavaScript APIs}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {231--235}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0090-x}, doi = {10.1007/S11623-012-0090-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Johns12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Junker12, author = {Holger Junker}, title = {{OWASP} Enterprise Security {API}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {801--804}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0275-3}, doi = {10.1007/S11623-012-0275-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Junker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KabothWW12, author = {Daniel Kaboth and Bettina We{\ss}elmann and Johannes Wiele}, title = {Zielkonflikte um Datenschutz, Sicherheit und Leben - Das Beispiel Klinikum}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {679--683}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0226-z}, doi = {10.1007/S11623-012-0226-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KabothWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KalabisS12, author = {Lukas Kalabis and Annika Selzer}, title = {Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsm{\"{o}}glichkeiten im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {670--675}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0224-1}, doi = {10.1007/S11623-012-0224-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KalabisS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KargT12, author = {Moritz Karg and Sven Thomsen}, title = {Tracking und Analyse durch Facebook - Das Ende der Unschuld}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {729--736}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0240-1}, doi = {10.1007/S11623-012-0240-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KargT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KatzenbeisserS12, author = {Stefan Katzenbeisser and Andr{\'{e}} Schaller}, title = {Physical Unclonable Functions}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {881--885}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0295-z}, doi = {10.1007/S11623-012-0295-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KatzenbeisserS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KipkerV12, author = {Dennis{-}Kenji Kipker and Friederike Voskamp}, title = {Datenschutz in sozialen Netzwerken nach der Datenschutzgrundverordnung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {737--742}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0241-0}, doi = {10.1007/S11623-012-0241-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KipkerV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kort12, author = {Michael Kort}, title = {Soziale Netzwerke und Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {722--728}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0239-7}, doi = {10.1007/S11623-012-0239-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kort12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kugelmann12, author = {Dieter Kugelmann}, title = {Datenschutz bei Polizei und Justiz - Der Richtlinienvorschlag der Kommission}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {581--583}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0184-5}, doi = {10.1007/S11623-012-0184-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kugelmann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kurz12, author = {Sascha Kurz}, title = {Bremst Richtervorbehalt den Datenschutz aus? - Richtervorbehalt versus datenschutzrechtliche Kontrollkompetenz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {258--261}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0095-5}, doi = {10.1007/S11623-012-0095-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kurz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kutscha12, author = {Martin Kutscha}, title = {Das "Computer-Grundrecht" - eine Erfolgsgeschichte?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {391--394}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0146-y}, doi = {10.1007/S11623-012-0146-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kutscha12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LaddL12, author = {David C. Ladd and Steven B. Lipner}, title = {Prescriptive vs. Descriptive Security - Observations on a growing paradigm shift in development security practices}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {631--634}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0216-1}, doi = {10.1007/S11623-012-0216-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LaddL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ladeur12, author = {Karl Heinz Ladeur}, title = {Neue Institutionen f{\"{u}}r den Daten- und Pers{\"{o}}nlichkeitsschutz im Internet: "Cyber-Courts" f{\"{u}}r die Blogosphere - Datenschutz in Netzwerken gegen{\"{u}}ber dem Staat und Providern (insbesondere "social media" wie Facebook)}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {711--715}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0237-9}, doi = {10.1007/S11623-012-0237-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ladeur12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LepperhoffPT12, author = {Niels Lepperhoff and Bj{\"{o}}rn Petersdorf and Sabine Thursch}, title = {Datenschutzverst{\"{o}}{\ss}e und Vollzugsdefizite - Ergebnisse des Datenschutzbarometers 2011}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {195--199}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0064-z}, doi = {10.1007/S11623-012-0064-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LepperhoffPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lewinski12, author = {Kai von Lewinski}, title = {Europ{\"{a}}isierung des Datenschutzrechts - Umsetzungsspielraum des deutschen Gesetzgebers und Entscheidungskomptenz des BVerfG}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {564--570}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0181-8}, doi = {10.1007/S11623-012-0181-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lewinski12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lipowicz12, author = {Irena Lipowicz}, title = {Das Problem des Datenschutzes in Polen im Hinblick auf die ACTA-Debatte}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {305--311}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0125-3}, doi = {10.1007/S11623-012-0125-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lipowicz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lutz12, author = {Stefan Lutz}, title = {Identifizierung von Urheberrechtsverletzern - Zul{\"{a}}ssigkeit der Ermittlung von IP-Adressen durch Anti-Piracy Firmen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {584--590}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0185-4}, doi = {10.1007/S11623-012-0185-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lutz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mangard12, author = {Stefan Mangard}, title = {Die physikalische Sicherheit eingebetteter Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {867--871}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0292-2}, doi = {10.1007/S11623-012-0292-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mangard12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MartiusS12, author = {Kai Martius and Alexander Senier}, title = {Plattformsicherheit - wie aktuell sind jahrzehntealte Konzepte heute?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {657--661}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0221-4}, doi = {10.1007/S11623-012-0221-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MartiusS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/McGraw12, author = {Gary McGraw}, title = {Software Security - Building Security In}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {662--665}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0222-3}, doi = {10.1007/S11623-012-0222-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/McGraw12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MerliS12, author = {Dominik Merli and Georg Sigl}, title = {Physical Unclonable Functions}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {876--880}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0294-0}, doi = {10.1007/S11623-012-0294-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MerliS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester12, author = {Britta Alexandra Mester}, title = {Bildungsauftrag - Datenschutz als Aufgabe staatlicher Institutionen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {132}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0031-8}, doi = {10.1007/S11623-012-0031-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester12a, author = {Britta Alexandra Mester}, title = {D{\"{u}}sseldorfer Kreis - Aufsichtsbeh{\"{o}}rde f{\"{u}}r den Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {274}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0098-2}, doi = {10.1007/S11623-012-0098-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester12b, author = {Britta Alexandra Mester}, title = {Das Recht der Europ{\"{a}}ischen Union}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {603}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0188-1}, doi = {10.1007/S11623-012-0188-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muller-PeltzerN12, author = {Philipp M{\"{u}}ller{-}Peltzer and Alexander Nguyen}, title = {Das Recht auf Einsicht in die Patientenakte - Die Unzul{\"{a}}ssigkeit des Vorbehalts zu Gunsten subjektiver {\"{a}}rztlicher Eindr{\"{u}}cke und Wahrnehmungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {117--121}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0028-3}, doi = {10.1007/S11623-012-0028-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muller-PeltzerN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mulliner12, author = {Collin Mulliner}, title = {Pers{\"{o}}nliche Datenspuren bei der mobilen Internetnutzung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {180--184}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0061-2}, doi = {10.1007/S11623-012-0061-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mulliner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nunez12, author = {Mariano Nunez}, title = {Cyber-attacks on {ERP} systems - An analysis of the current threat landscape}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {653--656}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0220-5}, doi = {10.1007/S11623-012-0220-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nunez12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Panzer-Heemeier12, author = {Andrea Panzer{-}Heemeier}, title = {Der Zugriff auf dienstliche E-Mails - Neubewertung des Arbeitgebers als Provider?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {48--53}, year = {2012}, url = {http://www.springerlink.com/content/y33q7532008l78j2/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Panzer-Heemeier12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Paulus12, author = {Sachar Paulus}, title = {Software-Integrit{\"{a}}t - geht das? - Vertraulichkeit und Integrit{\"{a}}t von Informationen durch sichere Software}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {413--418}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0150-2}, doi = {10.1007/S11623-012-0150-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Paulus12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Paulus12a, author = {Sachar Paulus}, title = {Geeignete Anforderungen f{\"{u}}r sichere Software}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {814--816}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0278-0}, doi = {10.1007/S11623-012-0278-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Paulus12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri12, author = {Thomas Petri}, title = {Pr{\"{u}}fbericht zum "Staatstrojaner"}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {710}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0236-x}, doi = {10.1007/S11623-012-0236-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Prietz12, author = {Christian Prietz}, title = {Musterprozesse zum Datenschutzmanagement - Eine Beschreibung von Musterprozessen zum inner-organisationellen Datenschutzmanagement}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {14--19}, year = {2012}, url = {http://www.springerlink.com/content/g05x27u822673656/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Prietz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Probst12, author = {Thomas Probst}, title = {Generische Schutzma{\ss}nahmen f{\"{u}}r Datenschutz-Schutzziele}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {439--444}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0154-y}, doi = {10.1007/S11623-012-0154-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Probst12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Prodan12, author = {Olena Prodan}, title = {Datenschutzrecht in der Ukraine}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {359--363}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0135-1}, doi = {10.1007/S11623-012-0135-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Prodan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Quiring-Kock12, author = {Gisela Quiring{-}Kock}, title = {Anforderungen an ein Datenschutzmanagementsystem}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {832--836}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0282-4}, doi = {10.1007/S11623-012-0282-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Quiring-Kock12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rass12, author = {Stefan Rass}, title = {Neue L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {473}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0161-z}, doi = {10.1007/S11623-012-0161-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rass12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12, author = {Helmut Reimer}, title = {Certgate L{\"{o}}sungen: NFC-Funktionen f{\"{u}}r viele Anwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {288--289}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0113-7}, doi = {10.1007/S11623-012-0113-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12a, author = {Helmut Reimer}, title = {{IT.NRW:} Elektronische {\"{U}}bermittlung von Elterngeldbescheinigungen an die Finanzverwaltung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {289}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0114-6}, doi = {10.1007/S11623-012-0114-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12b, author = {Helmut Reimer}, title = {BMWI-Studie: Standards bei Cloud Computing}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {289}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0115-5}, doi = {10.1007/S11623-012-0115-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12c, author = {Helmut Reimer}, title = {Acronis: 10 Tipps f{\"{u}}r einen Disaster-Recovery-Plan}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {289--290}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0116-4}, doi = {10.1007/S11623-012-0116-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12d, author = {Helmut Reimer}, title = {{DSRI/DGRI} Herbstakademie 2012: {IT} und Internet - mit Recht gestalten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {290}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0117-3}, doi = {10.1007/S11623-012-0117-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12e, author = {Helmut Reimer}, title = {{ISSE} 2012, Br{\"{u}}ssel, 23./24.10.2012}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {291}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0118-2}, doi = {10.1007/S11623-012-0118-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12f, author = {Helmut Reimer}, title = {Offene T{\"{u}}ren f{\"{u}}r Cyber-Kriminelle}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {291}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0119-1}, doi = {10.1007/S11623-012-0119-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer12g, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {917--923}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0302-4}, doi = {10.1007/S11623-012-0302-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12, author = {Helmut Reimer}, title = {LfDI Hamburg: 2. T{\"{a}}tigkeitsbericht 2010/11 zur Informationsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {213}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0068-8}, doi = {10.1007/S11623-012-0068-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12a, author = {Helmut Reimer}, title = {LfD Niedersachsen: 20. T{\"{a}}tigkeitsbericht 2009/10}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {213--214}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0069-7}, doi = {10.1007/S11623-012-0069-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12b, author = {Helmut Reimer}, title = {LfD Baden-W{\"{u}}rttemberg: 30. T{\"{a}}tigkeitsbericht 2010/11}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {214}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0071-0}, doi = {10.1007/S11623-012-0071-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12c, author = {Helmut Reimer}, title = {LfD Sachsen: 15. {TB} f{\"{u}}r den {\"{o}}ffentlichen sowie 5. {TB} f{\"{u}}r den nicht-{\"{o}}ffentlichen Bereich}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {214--215}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0070-1}, doi = {10.1007/S11623-012-0070-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12d, author = {Helmut Reimer}, title = {Sechster Nationaler IT-Gipfel 2011 in M{\"{u}}nchen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {215--216}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0072-z}, doi = {10.1007/S11623-012-0072-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12e, author = {Helmut Reimer}, title = {Smart Meter - Smarter Datenschutz in intelligenten Stromnetzen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {216}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0073-y}, doi = {10.1007/S11623-012-0073-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12f, author = {Helmut Reimer}, title = {IT-Gipfel 2011 - Impuls f{\"{u}}r E-Justice}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {216--217}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0074-x}, doi = {10.1007/S11623-012-0074-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12g, author = {Helmut Reimer}, title = {Bund {\"{u}}bernimmt Vorsitz des IT-Planungsrats}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {217}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0076-8}, doi = {10.1007/S11623-012-0076-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12h, author = {Helmut Reimer}, title = {Studie: Selbst- und Fremdbild von Datenschutzbeauftragten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {217--218}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0075-9}, doi = {10.1007/S11623-012-0075-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12i, author = {Helmut Reimer}, title = {(a-I3): 7. Interdisziplin{\"{a}}res Symposium, Bochum, 16./17.04.2012}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {218}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0078-6}, doi = {10.1007/S11623-012-0078-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12j, author = {Helmut Reimer}, title = {App "Permission Watcher" f{\"{u}}r Android-Smartphones}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {218}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0079-5}, doi = {10.1007/S11623-012-0079-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12k, author = {Helmut Reimer}, title = {McAfee: Jahresprognose zur Cybersicherheit 2012}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {218--219}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0077-7}, doi = {10.1007/S11623-012-0077-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12l, author = {Helmut Reimer}, title = {Qualifizierte Elektronische Signaturen deutscher {ZDA} sind sicher}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {219--220}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0080-z}, doi = {10.1007/S11623-012-0080-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12m, author = {Helmut Reimer}, title = {Sicher-Stark-Team: Neue Video-DVD-Serie mit dem Titel "So sch{\"{u}}tzen Sie Ihr Kind vor den Gefahren des Internets!"}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {220}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0081-y}, doi = {10.1007/S11623-012-0081-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12n, author = {Helmut Reimer}, title = {Mentana-Claimsoft {AG:} ISO-Zertifikat f{\"{u}}r De-Mail-Infrastruktur}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {220}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0082-x}, doi = {10.1007/S11623-012-0082-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12o, author = {Helmut Reimer}, title = {LfDI Rheinland-Pfalz: 23. T{\"{a}}tigkeitsbericht 2010/2011}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {284}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0102-x}, doi = {10.1007/S11623-012-0102-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12p, author = {Helmut Reimer}, title = {LfDI Brandenburg: 16. T{\"{a}}tigkeitsbericht 2010/2011}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {284--285}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0103-9}, doi = {10.1007/S11623-012-0103-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12q, author = {Helmut Reimer}, title = {De-Mail-Diensteanbieter akkreditiert}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {285--286}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0104-8}, doi = {10.1007/S11623-012-0104-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12r, author = {Helmut Reimer}, title = {Allianz f{\"{u}}r Cyber-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {286}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0105-7}, doi = {10.1007/S11623-012-0105-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12s, author = {Helmut Reimer}, title = {{BSI:} Leitfaden f{\"{u}}r eine Sichere IPv6-Netwerkarchitektur}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {286}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0106-6}, doi = {10.1007/S11623-012-0106-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12t, author = {Helmut Reimer}, title = {Migrationsleitfaden in der Version 4.0 ver{\"{o}}ffentlicht}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {286}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0107-5}, doi = {10.1007/S11623-012-0107-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12u, author = {Helmut Reimer}, title = {Geoportal.DE freigeschaltet}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {287}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0108-4}, doi = {10.1007/S11623-012-0108-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12v, author = {Helmut Reimer}, title = {Fr{\"{u}}hjahrssitzung des IT-Planungsrats}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {287}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0109-3}, doi = {10.1007/S11623-012-0109-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12w, author = {Helmut Reimer}, title = {Kodex f{\"{u}}r soziale Netzwerke: Zwischenergebnis, M{\"{a}}rz 2012}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {287--288}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0110-x}, doi = {10.1007/S11623-012-0110-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12x, author = {Helmut Reimer}, title = {Bundesdruckerei erh{\"{a}}lt Berechtigungszertifikat f{\"{u}}r Login-L{\"{o}}sung mit dem neuen Personalausweis - Bundesverwaltungsamt lobt neues kundenfreundliches Gesch{\"{a}}ftsmodell}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {288}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0111-9}, doi = {10.1007/S11623-012-0111-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerX12y, author = {Helmut Reimer}, title = {G{\&}D wird Trusted Service Manager f{\"{u}}r Intel- Mobilger{\"{a}}teplattformen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {288}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0112-8}, doi = {10.1007/S11623-012-0112-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerX12y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Richter12, author = {Philipp Richter}, title = {Datenschutz durch Technik und die Grundverordnung der EU-Kommission}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {576--580}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0183-6}, doi = {10.1007/S11623-012-0183-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Richter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12, author = {Karl Rihaczek}, title = {Smart Grid}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {5}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0002-0}, doi = {10.1007/S11623-012-0002-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12a, author = {Karl Rihaczek}, title = {Ethik}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {80}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0020-y}, doi = {10.1007/S11623-012-0020-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12b, author = {Karl Rihaczek}, title = {Schnittstelle}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {153}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0054-1}, doi = {10.1007/S11623-012-0054-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12c, author = {Karl Rihaczek}, title = {Das Kuckucksei}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {229}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0088-4}, doi = {10.1007/S11623-012-0088-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12d, author = {Karl Rihaczek}, title = {Balance der Schmerzen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {302}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0123-5}, doi = {10.1007/S11623-012-0123-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12e, author = {Karl Rihaczek}, title = {Das Laster}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {389}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0144-0}, doi = {10.1007/S11623-012-0144-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12f, author = {Karl Rihaczek}, title = {Lust auf Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {477}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0162-y}, doi = {10.1007/S11623-012-0162-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12g, author = {Karl Rihaczek}, title = {Die Waffe}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {559}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0178-3}, doi = {10.1007/S11623-012-0178-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek12h, author = {Karl Rihaczek}, title = {Die andere Mondseite}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {708}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0235-y}, doi = {10.1007/S11623-012-0235-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek12h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ronellenfitsch12, author = {Michael Ronellenfitsch}, title = {Fortentwicklung des Datenschutzes - Die Pl{\"{a}}ne der Europ{\"{a}}ischen Kommission}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {561--563}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0180-9}, doi = {10.1007/S11623-012-0180-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ronellenfitsch12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel12, author = {Alexander Ro{\ss}nagel}, title = {Datenschutzgesetzgebung - Monopol oder Vielfalt?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {553--555}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0177-4}, doi = {10.1007/S11623-012-0177-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost12, author = {Martin Rost}, title = {Standardisierte Datenschutzmodellierung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {433--438}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0153-z}, doi = {10.1007/S11623-012-0153-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RostB12, author = {Martin Rost and Kirsten Bock}, title = {Impact Assessment im Lichte des Standard-Datenschutzmodells}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {743--747}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0242-z}, doi = {10.1007/S11623-012-0242-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RostB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SachsseW12, author = {Rolf Sachsse and Hartmut Wagner}, title = {Die Macht der Bilder oder Everybody's gonna be a Star for 15/10 of a Second}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {350--353}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0133-3}, doi = {10.1007/S11623-012-0133-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SachsseW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schaar12, author = {Peter Schaar}, title = {Europ{\"{a}}ischer Startschuss f{\"{u}}r die Datenschutzreform: Eine Chance f{\"{u}}r wirksame Verbesserungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {154}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0055-0}, doi = {10.1007/S11623-012-0055-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schaar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schaar12a, author = {Peter Schaar}, title = {2. Berliner Symposium des BfDI zur Informationsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {866}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0291-3}, doi = {10.1007/S11623-012-0291-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schaar12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchauerRS12, author = {Stefan Schauer and Benjamin Rainer and Rene Schmid}, title = {Ein spieltheoretischer Ansatz f{\"{u}}r das IT-Security-Risikomanagement - Ergebnisse des SERIMA-Projekts}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {492--496}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0166-7}, doi = {10.1007/S11623-012-0166-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchauerRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchildT12, author = {Hans{-}Hermann Schild and Marie{-}Theres Tinnefeld}, title = {Datenschutz in der Union - Gelungene oder missgl{\"{u}}ckte Gesetzentw{\"{u}}rfe?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {312--317}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0126-2}, doi = {10.1007/S11623-012-0126-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchildT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schleim12, author = {Stephan Schleim}, title = {Mind Reading - Neuroimaging as a gaze into the innermost of the psyche}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {344--349}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0132-4}, doi = {10.1007/S11623-012-0132-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schleim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmaleT12, author = {Wolfgang Schmale and Marie{-}Theres Tinnefeld}, title = {"Der Bau" von Kafka oder die (Staats)Trojaner-Architektur}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {401--405}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0148-9}, doi = {10.1007/S11623-012-0148-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchmaleT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schmidt12, author = {Bernd Schmidt}, title = {Arbeitnehmerdatenschutz in Norwegen - Einsicht in E-Mail-Accounts und andere betriebliche Kommunikations- und Speichermedien}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {8}, pages = {591--596}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0186-3}, doi = {10.1007/S11623-012-0186-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schmidt12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel12, author = {Christoph Schnabel}, title = {Der Schutz personenbezogener Daten bei informationsfreiheitsrechtlichen Anspr{\"{u}}chen nach {\textsection} 11 HmbIFG}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {520--525}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0171-x}, doi = {10.1007/S11623-012-0171-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel12a, author = {Christoph Schnabel}, title = {Maximini, Dominique: Polizeiliche Video{\"{u}}berwachung {\"{o}}ffentlicher Stra{\ss}en und Pl{\"{a}}tze zur Kriminalit{\"{a}}tspr{\"{a}}vention, Verlag Alma Mater, 215 S., 48, - {\mbox{\texteuro}}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {785--786}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0266-4}, doi = {10.1007/S11623-012-0266-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchnarzS12, author = {Pierre Schnarz and Mark M. Seeger}, title = {B{\"{u}}rgerbefragung zur IT-Sicherheit im Endanwenderbereich}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {253--257}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0094-6}, doi = {10.1007/S11623-012-0094-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchnarzS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz12, author = {Andreas D. Schulz}, title = {Nutzung und Datenschutzpraxis im studiVZ - Eine Untersuchung zum Selbstdatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {262--269}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0096-4}, doi = {10.1007/S11623-012-0096-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz12a, author = {Gabriel Schulz}, title = {Das neue IT-Grundrecht - staatliche Schutzpflicht und Infrastrukturverantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {395--400}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0147-x}, doi = {10.1007/S11623-012-0147-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchulzH12, author = {S{\"{o}}nke E. Schulz and Christian Hoffmann}, title = {Staatliche Datenerhebung in sozialen Netzwerken}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {7--13}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0004-y}, doi = {10.1007/S11623-012-0004-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchulzH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SelzerW12, author = {Annika Selzer and Ulrich Waldmann}, title = {eID in Deutschland und den {USA}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {200}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0065-y}, doi = {10.1007/S11623-012-0065-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SelzerW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seubert12, author = {Sandra Seubert}, title = {Der gesellschaftliche Wert des Privaten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {100--104}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0025-6}, doi = {10.1007/S11623-012-0025-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seubert12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Simpson12, author = {Stacy Simpson}, title = {Sharing Lessons Learned: "Practiced" Practices for Software Security}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {641--644}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0218-z}, doi = {10.1007/S11623-012-0218-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Simpson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SkistimsVDR12, author = {Hendrik Skistims and Christian Voigtmann and Klaus David and Alexander Ro{\ss}nagel}, title = {Datenschutzgerechte Gestaltung von kontextvorhersagenden Algorithmen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {31--36}, year = {2012}, url = {http://www.springerlink.com/content/nv263851022628u1/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SkistimsVDR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SlamanigS12, author = {Daniel Slamanig and Christian Stingl}, title = {Vollst{\"{a}}ndigkeitsnachweis f{\"{u}}r Daten im Cloud Computing}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {510--514}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0169-4}, doi = {10.1007/S11623-012-0169-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SlamanigS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SorgeK12, author = {Christoph Sorge and Artus Krohn{-}Grimberghe}, title = {Bitcoin: Eine erste Einordnung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {479--484}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0164-9}, doi = {10.1007/S11623-012-0164-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SorgeK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Spitz12, author = {Stephan Spitz}, title = {Neue Mobiltelefone: Geldb{\"{o}}rse und Bankfiliale zugleich - Sicherheitsl{\"{o}}sungen f{\"{u}}r mobile Geldgesch{\"{a}}fte}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {3}, pages = {185--188}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0062-1}, doi = {10.1007/S11623-012-0062-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Spitz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stahler12, author = {Thomas P. St{\"{a}}hler}, title = {Kongehl, Gerhard (Hrsg.): Datenschutz-Management, Haufe-Lexware, Freiburg, Stand: Januar 2012, {ISBN} 978-3-8092-1705-3, 198, - Euro (mit Erg{\"{a}}nzungslieferungen als Update-Informationen nach Bedarf zu je 98, - {\mbox{\texteuro}} incl. MwSt)}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {786}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0269-1}, doi = {10.1007/S11623-012-0269-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stahler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stolte12, author = {Yolande Stolte}, title = {Journalism and Access to Data - The Phone Hacking Scandal, WikiLeaks and the Public Interest}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {354--358}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0134-2}, doi = {10.1007/S11623-012-0134-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stolte12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Stumpf12, author = {Frederic Stumpf}, title = {Allgegenw{\"{a}}rtig: Eingebettete Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {907}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0300-6}, doi = {10.1007/S11623-012-0300-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Stumpf12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tatli12, author = {Emin Islam Tatli}, title = {{OWASP} Anleitungen und Tools f{\"{u}}r Secure {SDLC}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {805--809}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0276-2}, doi = {10.1007/S11623-012-0276-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tatli12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld12, author = {Marie{-}Theres Tinnefeld}, title = {Datenschutz in der Union}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {364}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0136-0}, doi = {10.1007/S11623-012-0136-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld12a, author = {Marie{-}Theres Tinnefeld}, title = {Freedom of Information, Privacy and State Taboo}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {891--894}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0297-x}, doi = {10.1007/S11623-012-0297-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB12, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Neue Datenschutzstrukturen in Europa?}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {297--299}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0122-6}, doi = {10.1007/S11623-012-0122-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Verbauwhede12, author = {Ingrid Verbauwhede}, title = {Efficient and secure hardware}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {872--875}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0293-1}, doi = {10.1007/S11623-012-0293-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Verbauwhede12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner12, author = {Edgar Wagner}, title = {Datenschutz als Bildungsauftrag}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {83--87}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0022-9}, doi = {10.1007/S11623-012-0022-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner12a, author = {Edgar Wagner}, title = {Grenzen des europ{\"{a}}ischen Datenschutzrechts - Zum geplanten Datenschutzrechtsrahmen der {EU}}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {303--304}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0124-4}, doi = {10.1007/S11623-012-0124-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner12b, author = {Edgar Wagner}, title = {Der Entwurf einer Datenschutz-Grundverordnung der Europ{\"{a}}ischen Kommission}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {676--678}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0225-0}, doi = {10.1007/S11623-012-0225-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner12c, author = {Edgar Wagner}, title = {Die "Stiftung Datenschutz"}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {825--830}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0281-5}, doi = {10.1007/S11623-012-0281-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wakabayashi12, author = {Tsubasa Wakabayashi}, title = {Data privacy as a tool to combat discrimination? - The Japanese Example of data protection in the workplace}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {5}, pages = {327--332}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0129-z}, doi = {10.1007/S11623-012-0129-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wakabayashi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WarrenB12, author = {Samuel D. Warren and Louis D. Brandeis}, title = {Das Recht auf Privatheit - The Right to Privacy - Originalver{\"{o}}ffentlichung in Harvard Law Review, Vol. {IV} Dec. 15 , 1890 No. 5; {\"{u}}bersetzt und mit Zwischen{\"{u}}berschriften versehen von Marit Hansen und Thilo Weichert}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {755--766}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0245-9}, doi = {10.1007/S11623-012-0245-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WarrenB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WassK12, author = {Clemens Wass and Thomas Kurz}, title = {Digitale Hilfsmittel f{\"{u}}r mehr Transparenz bei der Verarbeitung personenbezogener Daten}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {748--752}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0243-y}, doi = {10.1007/S11623-012-0243-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WassK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeberW12, author = {Arnd Weber and Dirk Weber}, title = {Verifizierte Virtualisierung f{\"{u}}r mehr Sicherheit und Komfort}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {43--47}, year = {2012}, url = {http://www.springerlink.com/content/m342t72625278445/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/WeberW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener12, author = {Christoph Wegener}, title = {Ein neues Grundrecht}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {385}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0143-1}, doi = {10.1007/S11623-012-0143-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert12, author = {Thilo Weichert}, title = {Bisher nur m{\"{a}}{\ss}iger Erfolg der ULD-Facebook-Abmahnungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {6}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0003-z}, doi = {10.1007/S11623-012-0003-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert12a, author = {Thilo Weichert}, title = {Beschl{\"{u}}sse des D{\"{u}}sseldorfer Kreises}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {81--82}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0021-x}, doi = {10.1007/S11623-012-0021-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert12b, author = {Thilo Weichert}, title = {Unabh{\"{a}}ngiges Landeszentrum f{\"{u}}r Datenschutz Schleswig-Holstein zur Stiftung Datenschutz: "So wird daraus nichts"}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {4}, pages = {230}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0089-3}, doi = {10.1007/S11623-012-0089-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert12c, author = {Thilo Weichert}, title = {Datenschutzversto{\ss} als Gesch{\"{a}}ftsmodell - der Fall Facebook}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {716--721}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0238-8}, doi = {10.1007/S11623-012-0238-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert12d, author = {Thilo Weichert}, title = {Anmerkungen zu Warren/Brandeis - Das Recht auf Privatheit}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {10}, pages = {753--754}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0244-x}, doi = {10.1007/S11623-012-0244-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wetter12, author = {Dirk Wetter}, title = {{OWASP} Top 10: Zwei Jahre danach}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {810--813}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0277-1}, doi = {10.1007/S11623-012-0277-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wetter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wigoutschnigg12, author = {Raphael Wigoutschnigg}, title = {Anonymisierungsprotokolle}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {7}, pages = {515--519}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0170-y}, doi = {10.1007/S11623-012-0170-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wigoutschnigg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Winandy12, author = {Marcel Winandy}, title = {Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen und L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {6}, pages = {419--424}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0151-1}, doi = {10.1007/S11623-012-0151-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Winandy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WormsG12, author = {Christoph Worms and Christoph Gusy}, title = {Verfassung und Datenschutz - Das Private und das {\"{O}}ffentliche in der Rechtsordnung}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {2}, pages = {92--99}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0024-7}, doi = {10.1007/S11623-012-0024-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WormsG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wysopal12, author = {Chris Wysopal}, title = {Software security varies greatly}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {9}, pages = {645--652}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0219-y}, doi = {10.1007/S11623-012-0219-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wysopal12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12, title = {Nebenwirkungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {793}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0271-7}, doi = {10.1007/S11623-012-0271-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12a, title = {Melderecht datenschutzkonform gestalten!}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {794}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0272-6}, doi = {10.1007/S11623-012-0272-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12b, title = {Zum vom Deutschen Bundestag am 28. Juni 2012 beschlossenen Gesetz zur Fortentwicklung des Meldewesens}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {837--839}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0283-3}, doi = {10.1007/S11623-012-0283-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12c, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {841--849}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0285-1}, doi = {10.1007/S11623-012-0285-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12d, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {850--856}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0286-0}, doi = {10.1007/S11623-012-0286-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12e, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {856--857}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0287-z}, doi = {10.1007/S11623-012-0287-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12f, title = {Veranstaltungskalender}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {11}, pages = {859}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0288-y}, doi = {10.1007/S11623-012-0288-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12g, title = {Chores}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {865}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0290-4}, doi = {10.1007/S11623-012-0290-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12h, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {908--915}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0301-5}, doi = {10.1007/S11623-012-0301-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12i, title = {Rezensionen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {924--925}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0303-3}, doi = {10.1007/S11623-012-0303-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X12j, title = {Veranstaltungskalender 12 {\(\vert\)} 2012}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {12}, pages = {927}, year = {2012}, url = {https://doi.org/10.1007/s11623-012-0304-2}, doi = {10.1007/S11623-012-0304-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X12j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZibuschkaRH12, author = {Jan Zibuschka and Heiko Ro{\ss}nagel and Matthias Herbert}, title = {Sichere Verkn{\"{u}}pfung von Mashup Widgets durch Identity Based Encryption - Datenschutz in Gesch{\"{a}}ftsanwendungen}, journal = {Datenschutz und Datensicherheit}, volume = {36}, number = {1}, pages = {37--42}, year = {2012}, url = {http://www.springerlink.com/content/w1580l328v740r73/}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/ZibuschkaRH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.