Search dblp for Publications

export results for "toc:db/journals/dud/dud36.bht:"

 download as .bib file

@article{DBLP:journals/dud/AchtenP12,
  author       = {Oliver M. Achten and
                  Norbert Pohlmann},
  title        = {Sichere Apps - Vision oder Realit{\"{a}}t?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {161--164},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0057-y},
  doi          = {10.1007/S11623-012-0057-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AchtenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AlkassarSS12,
  author       = {Ammar Alkassar and
                  Steffen Schulz and
                  Christian St{\"{u}}ble},
  title        = {Sicherheitskern(e) f{\"{u}}r Smartphones: Ans{\"{a}}tze
                  und L{\"{o}}sungen - Vom Mikrokern bis zu Capabilities - Verschiedene
                  L{\"{o}}sungsans{\"{a}}tze f{\"{u}}r die App-Trennung
                  und -Kontrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {175--179},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0060-3},
  doi          = {10.1007/S11623-012-0060-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AlkassarSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Alsbih12,
  author       = {Amir Alsbih},
  title        = {Ein praktischer Weg zur Sicherheit von Eigenentwicklungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {241--245},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0092-8},
  doi          = {10.1007/S11623-012-0092-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Alsbih12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/AmmannS12,
  author       = {Franz{-}Ernst Ammann and
                  Aleksandra Sowa},
  title        = {Systematische Entwicklung von Metriken zur Beurteilung der Datensicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {247--251},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0093-7},
  doi          = {10.1007/S11623-012-0093-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/AmmannS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BackerDFS12,
  author       = {Matthias B{\"{a}}cker and
                  Andreas Dewald and
                  Felix C. Freiling and
                  Sven Schmitt},
  title        = {Kriterien f{\"{u}}r die Priorisierung bei der Sicherung und Analyse
                  digitaler Spuren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {597--602},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0187-2},
  doi          = {10.1007/S11623-012-0187-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BackerDFS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitz12,
  author       = {Gunter Bitz},
  title        = {Das Jahr der Hacks},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {625},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0213-4},
  doi          = {10.1007/S11623-012-0213-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bitz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BockM12,
  author       = {Kirsten Bock and
                  Sebastian Meissner},
  title        = {Datenschutz-Schutzziele im Recht - Zum normativen Gehalt der Datenschutz-Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {425--431},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0152-0},
  doi          = {10.1007/S11623-012-0152-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BockM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Boehm12,
  author       = {Franziska Boehm},
  title        = {Data processing and law enforcement access to information systems
                  at {EU} level - No consistent framework in spite of the envisaged
                  data protection reform},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {339--343},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0131-5},
  doi          = {10.1007/S11623-012-0131-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Boehm12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunGHMS12,
  author       = {Bastian Braun and
                  Patrick Gemein and
                  Benedikt H{\"{o}}fling and
                  Michael Marc Maisch and
                  Alexander Seidl},
  title        = {Angriffe auf OpenID und ihre strafrechtliche Bewertung - Cross Site
                  Request Forgery, Phishing und Clickjacking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {502--509},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0168-5},
  doi          = {10.1007/S11623-012-0168-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BraunGHMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brunst12,
  author       = {Phillip Brunst},
  title        = {Staatliche (Anti-)Krypto-Strategien - Kryptographie zwischen B{\"{u}}rgerrecht
                  und Bedrohung der nationalen Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {333--338},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0130-6},
  doi          = {10.1007/S11623-012-0130-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brunst12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner12,
  author       = {Benedikt Buchner},
  title        = {Facebook {\&} Co},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {705},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0234-z},
  doi          = {10.1007/S11623-012-0234-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner12a,
  author       = {Benedikt Buchner},
  title        = {Inhaltsdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {767},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0246-8},
  doi          = {10.1007/S11623-012-0246-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caspar12,
  author       = {Johannes Caspar},
  title        = {Zwischen Aufbau und Ausverkauf - Europas Zwiespalt in Sachen Datenschutz
                  vor dem Hintergrund der Fluggastdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {478},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0163-x},
  doi          = {10.1007/S11623-012-0163-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caspar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DesoiJ12,
  author       = {Monika Desoi and
                  Silke Jandt},
  title        = {Zul{\"{a}}ssige Erhebung von Daten zu Forschungszwecken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {895--901},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0298-9},
  doi          = {10.1007/S11623-012-0298-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DesoiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Detken12,
  author       = {Kai{-}Oliver Detken},
  title        = {Unternehmensnetzwerke sch{\"{u}}tzen und dennoch mobiles Potential
                  nutzen - M{\"{o}}gliche Bedrohungen und Sicherheitsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {169--174},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0059-9},
  doi          = {10.1007/S11623-012-0059-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Detken12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dittmayer12,
  author       = {Matthias Dittmayer},
  title        = {Fallstricke f{\"{u}}r Blogger - Datenschutz bei Telemedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {526--530},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0172-9},
  doi          = {10.1007/S11623-012-0172-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dittmayer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix12,
  author       = {Alexander Dix},
  title        = {Datenschutzaufsicht im Bundesstaat - ein Vorbild f{\"{u}}r Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {318--321},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0127-1},
  doi          = {10.1007/S11623-012-0127-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dix12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DriessenP12,
  author       = {Benedikt Driessen and
                  Christof Paar},
  title        = {Angriff auf Thuraya Satellitentelefonie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {886--890},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0296-y},
  doi          = {10.1007/S11623-012-0296-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DriessenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EDPS12,
  title        = {European Data Protection Supervisor {(EDPS):} Inventory 2012 - Towards
                  a more strategic approach to legislative consultation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {201--203},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0086-6},
  doi          = {10.1007/S11623-012-0086-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EDPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eckert12,
  author       = {Claudia Eckert},
  title        = {Embedded systems security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {861},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0289-x},
  doi          = {10.1007/S11623-012-0289-X},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Eckert12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Eiermann12,
  author       = {Helmut Eiermann},
  title        = {Das IT-Grundrecht und seine Folgen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {452},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0156-9},
  doi          = {10.1007/S11623-012-0156-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Eiermann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ertel12,
  author       = {Sebastian Ertel},
  title        = {Das Fragerecht des Arbeitgebers},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {126--131},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0030-9},
  doi          = {10.1007/S11623-012-0030-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ertel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Faludi12,
  author       = {Gabor Faludi},
  title        = {How not to turn a blind eye - Challenges in ensuring security with
                  Enterprise-scale software development},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {635--640},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0217-0},
  doi          = {10.1007/S11623-012-0217-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Faludi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FenzlK12,
  author       = {Thomas Fenzl and
                  Christian Kollmitzer},
  title        = {Usability gesichtserkennungsbasierter Authentifizierung - Ergebnisse
                  eines Feldtests},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {497--501},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0167-6},
  doi          = {10.1007/S11623-012-0167-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FenzlK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox12,
  author       = {Dirk Fox},
  title        = {Untragbar unertr{\"{a}}glich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0001-1},
  doi          = {10.1007/S11623-012-0001-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox12a,
  author       = {Dirk Fox},
  title        = {Hypervisor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {54},
  year         = {2012},
  url          = {http://www.springerlink.com/content/r81818287r155706/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Fox12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox12b,
  author       = {Dirk Fox},
  title        = {Neue Priorit{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {225},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0087-5},
  doi          = {10.1007/S11623-012-0087-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox12c,
  author       = {Dirk Fox},
  title        = {Captcha},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {531},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0173-8},
  doi          = {10.1007/S11623-012-0173-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox12d,
  author       = {Dirk Fox},
  title        = {Cross Site Scripting {(XSS)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {840},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0284-2},
  doi          = {10.1007/S11623-012-0284-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Franzen12,
  author       = {Martin Franzen},
  title        = {Der Vorschlag f{\"{u}}r eine EU-Datenschutz-Grundverordnung und
                  der Arbeitnehmer datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {322--326},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0128-0},
  doi          = {10.1007/S11623-012-0128-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Franzen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gaycken12,
  author       = {Sandro Gaycken},
  title        = {Does not compute - old security vs new threats},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {666--669},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0223-2},
  doi          = {10.1007/S11623-012-0223-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gaycken12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gebauer12,
  author       = {Joachim Gebauer},
  title        = {Code Signing - Programme als vertrauensw{\"{u}}rdig kennzeichnen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {684},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0227-y},
  doi          = {10.1007/S11623-012-0227-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gebauer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gerhager12,
  author       = {Stephan Gerhager},
  title        = {Informationssicherheit im zuk{\"{u}}nftigen Smart Grid},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {445--451},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0155-x},
  doi          = {10.1007/S11623-012-0155-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gerhager12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gimmler12,
  author       = {Roland Gimmler},
  title        = {Medienkompetenz und Datenschutzkompetenz in der Schule},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {110--116},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0027-4},
  doi          = {10.1007/S11623-012-0027-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gimmler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Glemser12,
  author       = {Tobias Glemser},
  title        = {{OWASP} und das deutsche Chapter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {795--796},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0273-5},
  doi          = {10.1007/S11623-012-0273-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Glemser12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grimm12,
  author       = {R{\"{u}}diger Grimm},
  title        = {Datenschutz als Bildungsaufgabe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {77},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0019-4},
  doi          = {10.1007/S11623-012-0019-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Grimm12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grimm12a,
  author       = {R{\"{u}}diger Grimm},
  title        = {Spuren im Netz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {88--91},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0023-8},
  doi          = {10.1007/S11623-012-0023-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Grimm12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grussen12,
  author       = {Ihr Gr{\"{u}}{\ss}en},
  title        = {Distanz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {629},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0214-3},
  doi          = {10.1007/S11623-012-0214-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Grussen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hallermann12,
  author       = {Ulrich Hallermann},
  title        = {Wann ist der Datenschutzbeauftragte fachkundig und unabh{\"{a}}ngig?
                  - Zum Beschluss des D{\"{u}}sseldorfer Kreises vom 25. November
                  2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {122--125},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0029-2},
  doi          = {10.1007/S11623-012-0029-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hallermann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hamdy12,
  author       = {Safuat Hamdy},
  title        = {Der {OWASP} Application Security Verification Standard},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {797--800},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0274-4},
  doi          = {10.1007/S11623-012-0274-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hamdy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen12,
  author       = {Marit Hansen},
  title        = {Vertraulichkeit und Integrit{\"{a}}t von Daten und IT-Systemen
                  im Cloud-Zeitalter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {407--412},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0149-8},
  doi          = {10.1007/S11623-012-0149-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HansenT12,
  author       = {Marit Hansen and
                  Christian Thiel},
  title        = {Cyber-Physical Systems und Privatsph{\"{a}}renschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {26--30},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0007-8},
  doi          = {10.1007/S11623-012-0007-8},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HansenT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hasse12,
  author       = {Lutz Hasse},
  title        = {Umsetzung der "Orientierungshilfe Krankenhausinformationssysteme"
                  in Th{\"{u}}ringen - Gemeinsame Informationsveranstaltung des
                  Th{\"{u}}ringer Landesbeauftragten f{\"{u}}r den Datenschutz
                  und der Landeskrankenhausgesellschaft Th{\"{u}}ringen e. {V}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {560},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0179-2},
  doi          = {10.1007/S11623-012-0179-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hasse12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Heider12,
  author       = {Jens Heider},
  title        = {Verantwortung: Smartphone},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {149},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0053-2},
  doi          = {10.1007/S11623-012-0053-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Heider12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeiderK12,
  author       = {Jens Heider and
                  Rachid El Khayari},
  title        = {Geht Ihr Smartphone fremd? - {\"{U}}bersicht der Angriffsvektoren
                  f{\"{u}}r Ger{\"{a}}te im Unternehmenseinsatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {155--160},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0056-z},
  doi          = {10.1007/S11623-012-0056-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeiderK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hemker12,
  author       = {Thomas Hemker},
  title        = {"Ich brauche das!" - Mobile Ger{\"{a}}te im Unternehmenseinsatz
                  - {\"{U}}bersicht {\"{u}}ber die Bedrohungslage und die
                  Schutzma{\ss}nahmen f{\"{u}}r die Verwendung gesch{\"{a}}ftlicher
                  Daten auf (privaten) mobilen Ger{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {165--168},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0058-x},
  doi          = {10.1007/S11623-012-0058-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hemker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Henking12,
  author       = {Tanja Henking},
  title        = {Schwerwiegende Verletzung des Pers{\"{o}}nlichkeitsrechts durch
                  HIV-Testung ohne Einwilligung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {823--824},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0280-6},
  doi          = {10.1007/S11623-012-0280-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Henking12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HessS12,
  author       = {Thomas Hess and
                  Michel Schreiner},
  title        = {{\"{O}}konomie der Privatsph{\"{a}}re - Eine Ann{\"{a}}herung
                  aus drei Perspektiven},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {105--109},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0026-5},
  doi          = {10.1007/S11623-012-0026-5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HessS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HohnePS12,
  author       = {Focke H{\"{o}}hne and
                  Henrich Christopher P{\"{o}}hls and
                  Kai Samelin},
  title        = {Rechtsfolgen editierbarer Signaturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {485--491},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0165-8},
  doi          = {10.1007/S11623-012-0165-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HohnePS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungF12,
  author       = {Gerrit Hornung and
                  Katharina Fuchs},
  title        = {Nutzerdaten im Smart Grid - zur Notwendigkeit einer differenzierten
                  grundrechtlichen Bewertung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {20--25},
  year         = {2012},
  url          = {http://www.springerlink.com/content/787h211k388g1372/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/HornungF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HornungHH12,
  author       = {Gerrit Hornung and
                  Moritz Horsch and
                  Detlef H{\"{u}}hnlein},
  title        = {Mobile Authentisierung und Signatur mit dem neuen Personalausweis
                  - Innovative technische und rechtliche L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {189--194},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0063-0},
  doi          = {10.1007/S11623-012-0063-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HornungHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Iraschko-LuscherK12,
  author       = {Stephanie Iraschko{-}Luscher and
                  Pia Kiekenbeck},
  title        = {Bezahlm{\"{o}}glichkeiten im Internet - schnell, sicher und datenschutzkonform?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {902--906},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0299-8},
  doi          = {10.1007/S11623-012-0299-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Iraschko-LuscherK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jaspers12,
  author       = {Andreas Jaspers},
  title        = {Die EU-Datenschutz-Grundverordnung - Auswirkungen der EU-Datenschutz-Grundverordnung
                  auf die Datenschutzorganisation des Unternehmens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {571--575},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0182-7},
  doi          = {10.1007/S11623-012-0182-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jaspers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian12,
  author       = {Kai Jendrian},
  title        = {Sicherheit als Qualit{\"{a}}tsmerkmal mit OpenSAMM},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {270--273},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0097-3},
  doi          = {10.1007/S11623-012-0097-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jendrian12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian12a,
  author       = {Kai Jendrian},
  title        = {Divide et impera!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {789},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0270-8},
  doi          = {10.1007/S11623-012-0270-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jendrian12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JensenJIMS12,
  author       = {Meiko Jensen and
                  Holger Junker and
                  Luigi Lo Iacono and
                  Christian Mainka and
                  J{\"{o}}rg Schwenk},
  title        = {{XML} Signature Wrapping Angriffe wirksam unterbinden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {236--240},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0091-9},
  doi          = {10.1007/S11623-012-0091-9},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JensenJIMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Johannes12,
  author       = {Paul C. Johannes},
  title        = {Das Recht des Forschers auf Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {817--822},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0279-z},
  doi          = {10.1007/S11623-012-0279-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Johannes12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Johns12,
  author       = {Martin Johns},
  title        = {HTML5-Security - Sicherer Umgang mit den neuen JavaScript APIs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {231--235},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0090-x},
  doi          = {10.1007/S11623-012-0090-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Johns12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Junker12,
  author       = {Holger Junker},
  title        = {{OWASP} Enterprise Security {API}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {801--804},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0275-3},
  doi          = {10.1007/S11623-012-0275-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Junker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KabothWW12,
  author       = {Daniel Kaboth and
                  Bettina We{\ss}elmann and
                  Johannes Wiele},
  title        = {Zielkonflikte um Datenschutz, Sicherheit und Leben - Das Beispiel
                  Klinikum},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {679--683},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0226-z},
  doi          = {10.1007/S11623-012-0226-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KabothWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KalabisS12,
  author       = {Lukas Kalabis and
                  Annika Selzer},
  title        = {Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsm{\"{o}}glichkeiten
                  im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {670--675},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0224-1},
  doi          = {10.1007/S11623-012-0224-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KalabisS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KargT12,
  author       = {Moritz Karg and
                  Sven Thomsen},
  title        = {Tracking und Analyse durch Facebook - Das Ende der Unschuld},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {729--736},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0240-1},
  doi          = {10.1007/S11623-012-0240-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KargT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KatzenbeisserS12,
  author       = {Stefan Katzenbeisser and
                  Andr{\'{e}} Schaller},
  title        = {Physical Unclonable Functions},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {881--885},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0295-z},
  doi          = {10.1007/S11623-012-0295-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KatzenbeisserS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KipkerV12,
  author       = {Dennis{-}Kenji Kipker and
                  Friederike Voskamp},
  title        = {Datenschutz in sozialen Netzwerken nach der Datenschutzgrundverordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {737--742},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0241-0},
  doi          = {10.1007/S11623-012-0241-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KipkerV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kort12,
  author       = {Michael Kort},
  title        = {Soziale Netzwerke und Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {722--728},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0239-7},
  doi          = {10.1007/S11623-012-0239-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kort12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kugelmann12,
  author       = {Dieter Kugelmann},
  title        = {Datenschutz bei Polizei und Justiz - Der Richtlinienvorschlag der
                  Kommission},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {581--583},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0184-5},
  doi          = {10.1007/S11623-012-0184-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kugelmann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kurz12,
  author       = {Sascha Kurz},
  title        = {Bremst Richtervorbehalt den Datenschutz aus? - Richtervorbehalt versus
                  datenschutzrechtliche Kontrollkompetenz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {258--261},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0095-5},
  doi          = {10.1007/S11623-012-0095-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kurz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscha12,
  author       = {Martin Kutscha},
  title        = {Das "Computer-Grundrecht" - eine Erfolgsgeschichte?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {391--394},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0146-y},
  doi          = {10.1007/S11623-012-0146-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutscha12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LaddL12,
  author       = {David C. Ladd and
                  Steven B. Lipner},
  title        = {Prescriptive vs. Descriptive Security - Observations on a growing
                  paradigm shift in development security practices},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {631--634},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0216-1},
  doi          = {10.1007/S11623-012-0216-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LaddL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ladeur12,
  author       = {Karl Heinz Ladeur},
  title        = {Neue Institutionen f{\"{u}}r den Daten- und Pers{\"{o}}nlichkeitsschutz
                  im Internet: "Cyber-Courts" f{\"{u}}r die Blogosphere - Datenschutz
                  in Netzwerken gegen{\"{u}}ber dem Staat und Providern (insbesondere
                  "social media" wie Facebook)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {711--715},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0237-9},
  doi          = {10.1007/S11623-012-0237-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ladeur12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LepperhoffPT12,
  author       = {Niels Lepperhoff and
                  Bj{\"{o}}rn Petersdorf and
                  Sabine Thursch},
  title        = {Datenschutzverst{\"{o}}{\ss}e und Vollzugsdefizite - Ergebnisse
                  des Datenschutzbarometers 2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {195--199},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0064-z},
  doi          = {10.1007/S11623-012-0064-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LepperhoffPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lewinski12,
  author       = {Kai von Lewinski},
  title        = {Europ{\"{a}}isierung des Datenschutzrechts - Umsetzungsspielraum
                  des deutschen Gesetzgebers und Entscheidungskomptenz des BVerfG},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {564--570},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0181-8},
  doi          = {10.1007/S11623-012-0181-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lewinski12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lipowicz12,
  author       = {Irena Lipowicz},
  title        = {Das Problem des Datenschutzes in Polen im Hinblick auf die ACTA-Debatte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {305--311},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0125-3},
  doi          = {10.1007/S11623-012-0125-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lipowicz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lutz12,
  author       = {Stefan Lutz},
  title        = {Identifizierung von Urheberrechtsverletzern - Zul{\"{a}}ssigkeit
                  der Ermittlung von IP-Adressen durch Anti-Piracy Firmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {584--590},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0185-4},
  doi          = {10.1007/S11623-012-0185-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lutz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mangard12,
  author       = {Stefan Mangard},
  title        = {Die physikalische Sicherheit eingebetteter Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {867--871},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0292-2},
  doi          = {10.1007/S11623-012-0292-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mangard12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MartiusS12,
  author       = {Kai Martius and
                  Alexander Senier},
  title        = {Plattformsicherheit - wie aktuell sind jahrzehntealte Konzepte heute?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {657--661},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0221-4},
  doi          = {10.1007/S11623-012-0221-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MartiusS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/McGraw12,
  author       = {Gary McGraw},
  title        = {Software Security - Building Security In},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {662--665},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0222-3},
  doi          = {10.1007/S11623-012-0222-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/McGraw12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MerliS12,
  author       = {Dominik Merli and
                  Georg Sigl},
  title        = {Physical Unclonable Functions},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {876--880},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0294-0},
  doi          = {10.1007/S11623-012-0294-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MerliS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester12,
  author       = {Britta Alexandra Mester},
  title        = {Bildungsauftrag - Datenschutz als Aufgabe staatlicher Institutionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {132},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0031-8},
  doi          = {10.1007/S11623-012-0031-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester12a,
  author       = {Britta Alexandra Mester},
  title        = {D{\"{u}}sseldorfer Kreis - Aufsichtsbeh{\"{o}}rde f{\"{u}}r
                  den Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {274},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0098-2},
  doi          = {10.1007/S11623-012-0098-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester12b,
  author       = {Britta Alexandra Mester},
  title        = {Das Recht der Europ{\"{a}}ischen Union},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {603},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0188-1},
  doi          = {10.1007/S11623-012-0188-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muller-PeltzerN12,
  author       = {Philipp M{\"{u}}ller{-}Peltzer and
                  Alexander Nguyen},
  title        = {Das Recht auf Einsicht in die Patientenakte - Die Unzul{\"{a}}ssigkeit
                  des Vorbehalts zu Gunsten subjektiver {\"{a}}rztlicher Eindr{\"{u}}cke
                  und Wahrnehmungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {117--121},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0028-3},
  doi          = {10.1007/S11623-012-0028-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muller-PeltzerN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mulliner12,
  author       = {Collin Mulliner},
  title        = {Pers{\"{o}}nliche Datenspuren bei der mobilen Internetnutzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {180--184},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0061-2},
  doi          = {10.1007/S11623-012-0061-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mulliner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nunez12,
  author       = {Mariano Nunez},
  title        = {Cyber-attacks on {ERP} systems - An analysis of the current threat
                  landscape},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {653--656},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0220-5},
  doi          = {10.1007/S11623-012-0220-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nunez12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Panzer-Heemeier12,
  author       = {Andrea Panzer{-}Heemeier},
  title        = {Der Zugriff auf dienstliche E-Mails - Neubewertung des Arbeitgebers
                  als Provider?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {48--53},
  year         = {2012},
  url          = {http://www.springerlink.com/content/y33q7532008l78j2/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Panzer-Heemeier12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Paulus12,
  author       = {Sachar Paulus},
  title        = {Software-Integrit{\"{a}}t - geht das? - Vertraulichkeit und Integrit{\"{a}}t
                  von Informationen durch sichere Software},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {413--418},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0150-2},
  doi          = {10.1007/S11623-012-0150-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Paulus12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Paulus12a,
  author       = {Sachar Paulus},
  title        = {Geeignete Anforderungen f{\"{u}}r sichere Software},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {814--816},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0278-0},
  doi          = {10.1007/S11623-012-0278-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Paulus12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri12,
  author       = {Thomas Petri},
  title        = {Pr{\"{u}}fbericht zum "Staatstrojaner"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {710},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0236-x},
  doi          = {10.1007/S11623-012-0236-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Prietz12,
  author       = {Christian Prietz},
  title        = {Musterprozesse zum Datenschutzmanagement - Eine Beschreibung von Musterprozessen
                  zum inner-organisationellen Datenschutzmanagement},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {14--19},
  year         = {2012},
  url          = {http://www.springerlink.com/content/g05x27u822673656/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Prietz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Probst12,
  author       = {Thomas Probst},
  title        = {Generische Schutzma{\ss}nahmen f{\"{u}}r Datenschutz-Schutzziele},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {439--444},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0154-y},
  doi          = {10.1007/S11623-012-0154-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Probst12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Prodan12,
  author       = {Olena Prodan},
  title        = {Datenschutzrecht in der Ukraine},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {359--363},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0135-1},
  doi          = {10.1007/S11623-012-0135-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Prodan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock12,
  author       = {Gisela Quiring{-}Kock},
  title        = {Anforderungen an ein Datenschutzmanagementsystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {832--836},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0282-4},
  doi          = {10.1007/S11623-012-0282-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rass12,
  author       = {Stefan Rass},
  title        = {Neue L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {473},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0161-z},
  doi          = {10.1007/S11623-012-0161-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rass12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12,
  author       = {Helmut Reimer},
  title        = {Certgate L{\"{o}}sungen: NFC-Funktionen f{\"{u}}r viele
                  Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {288--289},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0113-7},
  doi          = {10.1007/S11623-012-0113-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12a,
  author       = {Helmut Reimer},
  title        = {{IT.NRW:} Elektronische {\"{U}}bermittlung von Elterngeldbescheinigungen
                  an die Finanzverwaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {289},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0114-6},
  doi          = {10.1007/S11623-012-0114-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12b,
  author       = {Helmut Reimer},
  title        = {BMWI-Studie: Standards bei Cloud Computing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {289},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0115-5},
  doi          = {10.1007/S11623-012-0115-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12c,
  author       = {Helmut Reimer},
  title        = {Acronis: 10 Tipps f{\"{u}}r einen Disaster-Recovery-Plan},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {289--290},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0116-4},
  doi          = {10.1007/S11623-012-0116-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12d,
  author       = {Helmut Reimer},
  title        = {{DSRI/DGRI} Herbstakademie 2012: {IT} und Internet - mit Recht gestalten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {290},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0117-3},
  doi          = {10.1007/S11623-012-0117-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12e,
  author       = {Helmut Reimer},
  title        = {{ISSE} 2012, Br{\"{u}}ssel, 23./24.10.2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {291},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0118-2},
  doi          = {10.1007/S11623-012-0118-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12f,
  author       = {Helmut Reimer},
  title        = {Offene T{\"{u}}ren f{\"{u}}r Cyber-Kriminelle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {291},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0119-1},
  doi          = {10.1007/S11623-012-0119-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer12g,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {917--923},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0302-4},
  doi          = {10.1007/S11623-012-0302-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer12g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12,
  author       = {Helmut Reimer},
  title        = {LfDI Hamburg: 2. T{\"{a}}tigkeitsbericht 2010/11 zur Informationsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {213},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0068-8},
  doi          = {10.1007/S11623-012-0068-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12a,
  author       = {Helmut Reimer},
  title        = {LfD Niedersachsen: 20. T{\"{a}}tigkeitsbericht 2009/10},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {213--214},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0069-7},
  doi          = {10.1007/S11623-012-0069-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12b,
  author       = {Helmut Reimer},
  title        = {LfD Baden-W{\"{u}}rttemberg: 30. T{\"{a}}tigkeitsbericht
                  2010/11},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {214},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0071-0},
  doi          = {10.1007/S11623-012-0071-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12c,
  author       = {Helmut Reimer},
  title        = {LfD Sachsen: 15. {TB} f{\"{u}}r den {\"{o}}ffentlichen sowie
                  5. {TB} f{\"{u}}r den nicht-{\"{o}}ffentlichen Bereich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {214--215},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0070-1},
  doi          = {10.1007/S11623-012-0070-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12d,
  author       = {Helmut Reimer},
  title        = {Sechster Nationaler IT-Gipfel 2011 in M{\"{u}}nchen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {215--216},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0072-z},
  doi          = {10.1007/S11623-012-0072-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12e,
  author       = {Helmut Reimer},
  title        = {Smart Meter - Smarter Datenschutz in intelligenten Stromnetzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {216},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0073-y},
  doi          = {10.1007/S11623-012-0073-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12f,
  author       = {Helmut Reimer},
  title        = {IT-Gipfel 2011 - Impuls f{\"{u}}r E-Justice},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {216--217},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0074-x},
  doi          = {10.1007/S11623-012-0074-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12g,
  author       = {Helmut Reimer},
  title        = {Bund {\"{u}}bernimmt Vorsitz des IT-Planungsrats},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {217},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0076-8},
  doi          = {10.1007/S11623-012-0076-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12h,
  author       = {Helmut Reimer},
  title        = {Studie: Selbst- und Fremdbild von Datenschutzbeauftragten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {217--218},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0075-9},
  doi          = {10.1007/S11623-012-0075-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12i,
  author       = {Helmut Reimer},
  title        = {(a-I3): 7. Interdisziplin{\"{a}}res Symposium, Bochum, 16./17.04.2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {218},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0078-6},
  doi          = {10.1007/S11623-012-0078-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12j,
  author       = {Helmut Reimer},
  title        = {App "Permission Watcher" f{\"{u}}r Android-Smartphones},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {218},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0079-5},
  doi          = {10.1007/S11623-012-0079-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12k,
  author       = {Helmut Reimer},
  title        = {McAfee: Jahresprognose zur Cybersicherheit 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {218--219},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0077-7},
  doi          = {10.1007/S11623-012-0077-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12l,
  author       = {Helmut Reimer},
  title        = {Qualifizierte Elektronische Signaturen deutscher {ZDA} sind sicher},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {219--220},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0080-z},
  doi          = {10.1007/S11623-012-0080-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12m,
  author       = {Helmut Reimer},
  title        = {Sicher-Stark-Team: Neue Video-DVD-Serie mit dem Titel "So sch{\"{u}}tzen
                  Sie Ihr Kind vor den Gefahren des Internets!"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {220},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0081-y},
  doi          = {10.1007/S11623-012-0081-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12n,
  author       = {Helmut Reimer},
  title        = {Mentana-Claimsoft {AG:} ISO-Zertifikat f{\"{u}}r De-Mail-Infrastruktur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {220},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0082-x},
  doi          = {10.1007/S11623-012-0082-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12o,
  author       = {Helmut Reimer},
  title        = {LfDI Rheinland-Pfalz: 23. T{\"{a}}tigkeitsbericht 2010/2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {284},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0102-x},
  doi          = {10.1007/S11623-012-0102-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12p,
  author       = {Helmut Reimer},
  title        = {LfDI Brandenburg: 16. T{\"{a}}tigkeitsbericht 2010/2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {284--285},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0103-9},
  doi          = {10.1007/S11623-012-0103-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12q,
  author       = {Helmut Reimer},
  title        = {De-Mail-Diensteanbieter akkreditiert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {285--286},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0104-8},
  doi          = {10.1007/S11623-012-0104-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12r,
  author       = {Helmut Reimer},
  title        = {Allianz f{\"{u}}r Cyber-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {286},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0105-7},
  doi          = {10.1007/S11623-012-0105-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12s,
  author       = {Helmut Reimer},
  title        = {{BSI:} Leitfaden f{\"{u}}r eine Sichere IPv6-Netwerkarchitektur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {286},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0106-6},
  doi          = {10.1007/S11623-012-0106-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12t,
  author       = {Helmut Reimer},
  title        = {Migrationsleitfaden in der Version 4.0 ver{\"{o}}ffentlicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {286},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0107-5},
  doi          = {10.1007/S11623-012-0107-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12u,
  author       = {Helmut Reimer},
  title        = {Geoportal.DE freigeschaltet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {287},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0108-4},
  doi          = {10.1007/S11623-012-0108-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12v,
  author       = {Helmut Reimer},
  title        = {Fr{\"{u}}hjahrssitzung des IT-Planungsrats},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {287},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0109-3},
  doi          = {10.1007/S11623-012-0109-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12w,
  author       = {Helmut Reimer},
  title        = {Kodex f{\"{u}}r soziale Netzwerke: Zwischenergebnis, M{\"{a}}rz
                  2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {287--288},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0110-x},
  doi          = {10.1007/S11623-012-0110-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12x,
  author       = {Helmut Reimer},
  title        = {Bundesdruckerei erh{\"{a}}lt Berechtigungszertifikat f{\"{u}}r
                  Login-L{\"{o}}sung mit dem neuen Personalausweis - Bundesverwaltungsamt
                  lobt neues kundenfreundliches Gesch{\"{a}}ftsmodell},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {288},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0111-9},
  doi          = {10.1007/S11623-012-0111-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerX12y,
  author       = {Helmut Reimer},
  title        = {G{\&}D wird Trusted Service Manager f{\"{u}}r Intel- Mobilger{\"{a}}teplattformen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {288},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0112-8},
  doi          = {10.1007/S11623-012-0112-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerX12y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Richter12,
  author       = {Philipp Richter},
  title        = {Datenschutz durch Technik und die Grundverordnung der EU-Kommission},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {576--580},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0183-6},
  doi          = {10.1007/S11623-012-0183-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Richter12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12,
  author       = {Karl Rihaczek},
  title        = {Smart Grid},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {5},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0002-0},
  doi          = {10.1007/S11623-012-0002-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12a,
  author       = {Karl Rihaczek},
  title        = {Ethik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {80},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0020-y},
  doi          = {10.1007/S11623-012-0020-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12b,
  author       = {Karl Rihaczek},
  title        = {Schnittstelle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {153},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0054-1},
  doi          = {10.1007/S11623-012-0054-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12c,
  author       = {Karl Rihaczek},
  title        = {Das Kuckucksei},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {229},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0088-4},
  doi          = {10.1007/S11623-012-0088-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12d,
  author       = {Karl Rihaczek},
  title        = {Balance der Schmerzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {302},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0123-5},
  doi          = {10.1007/S11623-012-0123-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12e,
  author       = {Karl Rihaczek},
  title        = {Das Laster},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {389},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0144-0},
  doi          = {10.1007/S11623-012-0144-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12f,
  author       = {Karl Rihaczek},
  title        = {Lust auf Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {477},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0162-y},
  doi          = {10.1007/S11623-012-0162-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12g,
  author       = {Karl Rihaczek},
  title        = {Die Waffe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {559},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0178-3},
  doi          = {10.1007/S11623-012-0178-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek12h,
  author       = {Karl Rihaczek},
  title        = {Die andere Mondseite},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {708},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0235-y},
  doi          = {10.1007/S11623-012-0235-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek12h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ronellenfitsch12,
  author       = {Michael Ronellenfitsch},
  title        = {Fortentwicklung des Datenschutzes - Die Pl{\"{a}}ne der Europ{\"{a}}ischen
                  Kommission},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {561--563},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0180-9},
  doi          = {10.1007/S11623-012-0180-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ronellenfitsch12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel12,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Datenschutzgesetzgebung - Monopol oder Vielfalt?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {553--555},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0177-4},
  doi          = {10.1007/S11623-012-0177-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost12,
  author       = {Martin Rost},
  title        = {Standardisierte Datenschutzmodellierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {433--438},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0153-z},
  doi          = {10.1007/S11623-012-0153-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RostB12,
  author       = {Martin Rost and
                  Kirsten Bock},
  title        = {Impact Assessment im Lichte des Standard-Datenschutzmodells},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {743--747},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0242-z},
  doi          = {10.1007/S11623-012-0242-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RostB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SachsseW12,
  author       = {Rolf Sachsse and
                  Hartmut Wagner},
  title        = {Die Macht der Bilder oder Everybody's gonna be a Star for 15/10 of
                  a Second},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {350--353},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0133-3},
  doi          = {10.1007/S11623-012-0133-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SachsseW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schaar12,
  author       = {Peter Schaar},
  title        = {Europ{\"{a}}ischer Startschuss f{\"{u}}r die Datenschutzreform:
                  Eine Chance f{\"{u}}r wirksame Verbesserungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {154},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0055-0},
  doi          = {10.1007/S11623-012-0055-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schaar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schaar12a,
  author       = {Peter Schaar},
  title        = {2. Berliner Symposium des BfDI zur Informationsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {866},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0291-3},
  doi          = {10.1007/S11623-012-0291-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schaar12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchauerRS12,
  author       = {Stefan Schauer and
                  Benjamin Rainer and
                  Rene Schmid},
  title        = {Ein spieltheoretischer Ansatz f{\"{u}}r das IT-Security-Risikomanagement
                  - Ergebnisse des SERIMA-Projekts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {492--496},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0166-7},
  doi          = {10.1007/S11623-012-0166-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchauerRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchildT12,
  author       = {Hans{-}Hermann Schild and
                  Marie{-}Theres Tinnefeld},
  title        = {Datenschutz in der Union - Gelungene oder missgl{\"{u}}ckte Gesetzentw{\"{u}}rfe?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {312--317},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0126-2},
  doi          = {10.1007/S11623-012-0126-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchildT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schleim12,
  author       = {Stephan Schleim},
  title        = {Mind Reading - Neuroimaging as a gaze into the innermost of the psyche},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {344--349},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0132-4},
  doi          = {10.1007/S11623-012-0132-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schleim12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmaleT12,
  author       = {Wolfgang Schmale and
                  Marie{-}Theres Tinnefeld},
  title        = {"Der Bau" von Kafka oder die (Staats)Trojaner-Architektur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {401--405},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0148-9},
  doi          = {10.1007/S11623-012-0148-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchmaleT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schmidt12,
  author       = {Bernd Schmidt},
  title        = {Arbeitnehmerdatenschutz in Norwegen - Einsicht in E-Mail-Accounts
                  und andere betriebliche Kommunikations- und Speichermedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {8},
  pages        = {591--596},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0186-3},
  doi          = {10.1007/S11623-012-0186-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schmidt12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel12,
  author       = {Christoph Schnabel},
  title        = {Der Schutz personenbezogener Daten bei informationsfreiheitsrechtlichen
                  Anspr{\"{u}}chen nach {\textsection} 11 HmbIFG},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {520--525},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0171-x},
  doi          = {10.1007/S11623-012-0171-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel12a,
  author       = {Christoph Schnabel},
  title        = {Maximini, Dominique: Polizeiliche Video{\"{u}}berwachung {\"{o}}ffentlicher
                  Stra{\ss}en und Pl{\"{a}}tze zur Kriminalit{\"{a}}tspr{\"{a}}vention,
                  Verlag Alma Mater, 215 S., 48, - {\mbox{\texteuro}}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {785--786},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0266-4},
  doi          = {10.1007/S11623-012-0266-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchnarzS12,
  author       = {Pierre Schnarz and
                  Mark M. Seeger},
  title        = {B{\"{u}}rgerbefragung zur IT-Sicherheit im Endanwenderbereich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {253--257},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0094-6},
  doi          = {10.1007/S11623-012-0094-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchnarzS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz12,
  author       = {Andreas D. Schulz},
  title        = {Nutzung und Datenschutzpraxis im studiVZ - Eine Untersuchung zum Selbstdatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {262--269},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0096-4},
  doi          = {10.1007/S11623-012-0096-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz12a,
  author       = {Gabriel Schulz},
  title        = {Das neue IT-Grundrecht - staatliche Schutzpflicht und Infrastrukturverantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {395--400},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0147-x},
  doi          = {10.1007/S11623-012-0147-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchulzH12,
  author       = {S{\"{o}}nke E. Schulz and
                  Christian Hoffmann},
  title        = {Staatliche Datenerhebung in sozialen Netzwerken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {7--13},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0004-y},
  doi          = {10.1007/S11623-012-0004-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchulzH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SelzerW12,
  author       = {Annika Selzer and
                  Ulrich Waldmann},
  title        = {eID in Deutschland und den {USA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {200},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0065-y},
  doi          = {10.1007/S11623-012-0065-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SelzerW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seubert12,
  author       = {Sandra Seubert},
  title        = {Der gesellschaftliche Wert des Privaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {100--104},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0025-6},
  doi          = {10.1007/S11623-012-0025-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seubert12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Simpson12,
  author       = {Stacy Simpson},
  title        = {Sharing Lessons Learned: "Practiced" Practices for Software Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {641--644},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0218-z},
  doi          = {10.1007/S11623-012-0218-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Simpson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SkistimsVDR12,
  author       = {Hendrik Skistims and
                  Christian Voigtmann and
                  Klaus David and
                  Alexander Ro{\ss}nagel},
  title        = {Datenschutzgerechte Gestaltung von kontextvorhersagenden Algorithmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {31--36},
  year         = {2012},
  url          = {http://www.springerlink.com/content/nv263851022628u1/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SkistimsVDR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SlamanigS12,
  author       = {Daniel Slamanig and
                  Christian Stingl},
  title        = {Vollst{\"{a}}ndigkeitsnachweis f{\"{u}}r Daten im Cloud
                  Computing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {510--514},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0169-4},
  doi          = {10.1007/S11623-012-0169-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SlamanigS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SorgeK12,
  author       = {Christoph Sorge and
                  Artus Krohn{-}Grimberghe},
  title        = {Bitcoin: Eine erste Einordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {479--484},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0164-9},
  doi          = {10.1007/S11623-012-0164-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SorgeK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Spitz12,
  author       = {Stephan Spitz},
  title        = {Neue Mobiltelefone: Geldb{\"{o}}rse und Bankfiliale zugleich
                  - Sicherheitsl{\"{o}}sungen f{\"{u}}r mobile Geldgesch{\"{a}}fte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {3},
  pages        = {185--188},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0062-1},
  doi          = {10.1007/S11623-012-0062-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Spitz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stahler12,
  author       = {Thomas P. St{\"{a}}hler},
  title        = {Kongehl, Gerhard (Hrsg.): Datenschutz-Management, Haufe-Lexware, Freiburg,
                  Stand: Januar 2012, {ISBN} 978-3-8092-1705-3, 198, - Euro (mit Erg{\"{a}}nzungslieferungen
                  als Update-Informationen nach Bedarf zu je 98, - {\mbox{\texteuro}}
                  incl. MwSt)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {786},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0269-1},
  doi          = {10.1007/S11623-012-0269-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stahler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stolte12,
  author       = {Yolande Stolte},
  title        = {Journalism and Access to Data - The Phone Hacking Scandal, WikiLeaks
                  and the Public Interest},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {354--358},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0134-2},
  doi          = {10.1007/S11623-012-0134-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stolte12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Stumpf12,
  author       = {Frederic Stumpf},
  title        = {Allgegenw{\"{a}}rtig: Eingebettete Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {907},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0300-6},
  doi          = {10.1007/S11623-012-0300-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Stumpf12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tatli12,
  author       = {Emin Islam Tatli},
  title        = {{OWASP} Anleitungen und Tools f{\"{u}}r Secure {SDLC}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {805--809},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0276-2},
  doi          = {10.1007/S11623-012-0276-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tatli12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld12,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Datenschutz in der Union},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {364},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0136-0},
  doi          = {10.1007/S11623-012-0136-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld12a,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Freedom of Information, Privacy and State Taboo},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {891--894},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0297-x},
  doi          = {10.1007/S11623-012-0297-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB12,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Neue Datenschutzstrukturen in Europa?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {297--299},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0122-6},
  doi          = {10.1007/S11623-012-0122-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Verbauwhede12,
  author       = {Ingrid Verbauwhede},
  title        = {Efficient and secure hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {872--875},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0293-1},
  doi          = {10.1007/S11623-012-0293-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Verbauwhede12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner12,
  author       = {Edgar Wagner},
  title        = {Datenschutz als Bildungsauftrag},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {83--87},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0022-9},
  doi          = {10.1007/S11623-012-0022-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner12a,
  author       = {Edgar Wagner},
  title        = {Grenzen des europ{\"{a}}ischen Datenschutzrechts - Zum geplanten
                  Datenschutzrechtsrahmen der {EU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {303--304},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0124-4},
  doi          = {10.1007/S11623-012-0124-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner12b,
  author       = {Edgar Wagner},
  title        = {Der Entwurf einer Datenschutz-Grundverordnung der Europ{\"{a}}ischen
                  Kommission},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {676--678},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0225-0},
  doi          = {10.1007/S11623-012-0225-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner12c,
  author       = {Edgar Wagner},
  title        = {Die "Stiftung Datenschutz"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {825--830},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0281-5},
  doi          = {10.1007/S11623-012-0281-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wakabayashi12,
  author       = {Tsubasa Wakabayashi},
  title        = {Data privacy as a tool to combat discrimination? - The Japanese Example
                  of data protection in the workplace},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {5},
  pages        = {327--332},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0129-z},
  doi          = {10.1007/S11623-012-0129-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wakabayashi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WarrenB12,
  author       = {Samuel D. Warren and
                  Louis D. Brandeis},
  title        = {Das Recht auf Privatheit - The Right to Privacy - Originalver{\"{o}}ffentlichung
                  in Harvard Law Review, Vol. {IV} Dec. 15 , 1890 No. 5; {\"{u}}bersetzt
                  und mit Zwischen{\"{u}}berschriften versehen von Marit Hansen
                  und Thilo Weichert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {755--766},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0245-9},
  doi          = {10.1007/S11623-012-0245-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WarrenB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WassK12,
  author       = {Clemens Wass and
                  Thomas Kurz},
  title        = {Digitale Hilfsmittel f{\"{u}}r mehr Transparenz bei der Verarbeitung
                  personenbezogener Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {748--752},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0243-y},
  doi          = {10.1007/S11623-012-0243-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WassK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeberW12,
  author       = {Arnd Weber and
                  Dirk Weber},
  title        = {Verifizierte Virtualisierung f{\"{u}}r mehr Sicherheit und Komfort},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {43--47},
  year         = {2012},
  url          = {http://www.springerlink.com/content/m342t72625278445/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/WeberW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener12,
  author       = {Christoph Wegener},
  title        = {Ein neues Grundrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {385},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0143-1},
  doi          = {10.1007/S11623-012-0143-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert12,
  author       = {Thilo Weichert},
  title        = {Bisher nur m{\"{a}}{\ss}iger Erfolg der ULD-Facebook-Abmahnungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {6},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0003-z},
  doi          = {10.1007/S11623-012-0003-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert12a,
  author       = {Thilo Weichert},
  title        = {Beschl{\"{u}}sse des D{\"{u}}sseldorfer Kreises},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {81--82},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0021-x},
  doi          = {10.1007/S11623-012-0021-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert12b,
  author       = {Thilo Weichert},
  title        = {Unabh{\"{a}}ngiges Landeszentrum f{\"{u}}r Datenschutz Schleswig-Holstein
                  zur Stiftung Datenschutz: "So wird daraus nichts"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {4},
  pages        = {230},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0089-3},
  doi          = {10.1007/S11623-012-0089-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert12c,
  author       = {Thilo Weichert},
  title        = {Datenschutzversto{\ss} als Gesch{\"{a}}ftsmodell - der Fall Facebook},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {716--721},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0238-8},
  doi          = {10.1007/S11623-012-0238-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert12d,
  author       = {Thilo Weichert},
  title        = {Anmerkungen zu Warren/Brandeis - Das Recht auf Privatheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {10},
  pages        = {753--754},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0244-x},
  doi          = {10.1007/S11623-012-0244-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wetter12,
  author       = {Dirk Wetter},
  title        = {{OWASP} Top 10: Zwei Jahre danach},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {810--813},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0277-1},
  doi          = {10.1007/S11623-012-0277-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wetter12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wigoutschnigg12,
  author       = {Raphael Wigoutschnigg},
  title        = {Anonymisierungsprotokolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {7},
  pages        = {515--519},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0170-y},
  doi          = {10.1007/S11623-012-0170-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wigoutschnigg12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Winandy12,
  author       = {Marcel Winandy},
  title        = {Informationssicherheit in der Arztpraxis - Aktuelle Herausforderungen
                  und L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {6},
  pages        = {419--424},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0151-1},
  doi          = {10.1007/S11623-012-0151-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Winandy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WormsG12,
  author       = {Christoph Worms and
                  Christoph Gusy},
  title        = {Verfassung und Datenschutz - Das Private und das {\"{O}}ffentliche
                  in der Rechtsordnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {2},
  pages        = {92--99},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0024-7},
  doi          = {10.1007/S11623-012-0024-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WormsG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wysopal12,
  author       = {Chris Wysopal},
  title        = {Software security varies greatly},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {9},
  pages        = {645--652},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0219-y},
  doi          = {10.1007/S11623-012-0219-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wysopal12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12,
  title        = {Nebenwirkungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {793},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0271-7},
  doi          = {10.1007/S11623-012-0271-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12a,
  title        = {Melderecht datenschutzkonform gestalten!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {794},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0272-6},
  doi          = {10.1007/S11623-012-0272-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12b,
  title        = {Zum vom Deutschen Bundestag am 28. Juni 2012 beschlossenen Gesetz
                  zur Fortentwicklung des Meldewesens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {837--839},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0283-3},
  doi          = {10.1007/S11623-012-0283-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12c,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {841--849},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0285-1},
  doi          = {10.1007/S11623-012-0285-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12d,
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {850--856},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0286-0},
  doi          = {10.1007/S11623-012-0286-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12e,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {856--857},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0287-z},
  doi          = {10.1007/S11623-012-0287-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12f,
  title        = {Veranstaltungskalender},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {859},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0288-y},
  doi          = {10.1007/S11623-012-0288-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12g,
  title        = {Chores},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {865},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0290-4},
  doi          = {10.1007/S11623-012-0290-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12h,
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {908--915},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0301-5},
  doi          = {10.1007/S11623-012-0301-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12i,
  title        = {Rezensionen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {924--925},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0303-3},
  doi          = {10.1007/S11623-012-0303-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X12j,
  title        = {Veranstaltungskalender 12 {\(\vert\)} 2012},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {12},
  pages        = {927},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0304-2},
  doi          = {10.1007/S11623-012-0304-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X12j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZibuschkaRH12,
  author       = {Jan Zibuschka and
                  Heiko Ro{\ss}nagel and
                  Matthias Herbert},
  title        = {Sichere Verkn{\"{u}}pfung von Mashup Widgets durch Identity Based
                  Encryption - Datenschutz in Gesch{\"{a}}ftsanwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {1},
  pages        = {37--42},
  year         = {2012},
  url          = {http://www.springerlink.com/content/w1580l328v740r73/},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/ZibuschkaRH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics