Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud34.bht:"
@article{DBLP:journals/dud/Albrecht10, author = {Florian Albrecht}, title = {Schliesky, Utz (Hrsg.): Kommentar zum Gesetz {\"{u}}ber Personalausweise und den elektronischen Identit{\"{a}}tsausweis, Verlag des Lorenz-von-Stein-Instituts f{\"{u}}r Verwaltungswissenschaften an der Christian-Albrechts-Universit{\"{a}}t zu Kiel - Kiel 2009, 227 S., {ISBN} 978-3-936773-48-4. {\mbox{\texteuro}} 39.-}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {350}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0120-5}, doi = {10.1007/S11623-010-0120-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Albrecht10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Alich10, author = {Stefan Alich}, title = {"Task Force" im Kinosaal - Zur datenschutzrechtlichen Zul{\"{a}}ssigkeit des Einsatzes von Nachtsichtger{\"{a}}ten}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {44--47}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0011-9}, doi = {10.1007/S11623-010-0011-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Alich10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BackerFS10, author = {Matthias B{\"{a}}cker and Felix C. Freiling and Sven Schmitt}, title = {Selektion vor der Sicherung - Methoden zur effizienten forensischen Sicherung von digitalen Speichermedien}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {80--85}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0040-4}, doi = {10.1007/S11623-010-0040-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BackerFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BalfanzL10, author = {Judith Balfanz and Philip Laue}, title = {Transformation und elektronische Patientenakte - Beweiswerterhaltung und Risikominimierung bei der Transformation medizinischer Unterlagen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {815--818}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0222-0}, doi = {10.1007/S11623-010-0222-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BalfanzL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Barnitzke10, author = {Benno Barnitzke}, title = {Herausgabe von IP-Adressen - Eine datenschutzrechtliche Bewertung der Entscheidung des {OLG} Hamburg, Urteil vom 2.7.2008 - 5 {U} 73/07}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {482--485}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0135-y}, doi = {10.1007/S11623-010-0135-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Barnitzke10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BednerA10, author = {Mark Bedner and Tobias Ackermann}, title = {Schutzziele der IT-Sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {323--328}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0096-1}, doi = {10.1007/S11623-010-0096-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BednerA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeisenherzT10, author = {Gerhard Beisenherz and Marie{-}Theres Tinnefeld}, title = {Sozialdatenschutz - eine Frage des Besch{\"{a}}ftigtendatenschutzes?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {221--224}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0071-x}, doi = {10.1007/S11623-010-0071-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeisenherzT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BenderKMN10, author = {Jens Bender and Dennis K{\"{u}}gler and Marian Margraf and Ingo Naumann}, title = {Das Sperrmanagement im neuen deutschen Personalausweis - Sperrmanagement ohne globale chipindividuelle Merkmale}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {295--298}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0090-7}, doi = {10.1007/S11623-010-0090-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BenderKMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BenderKMN10a, author = {Jens Bender and Dennis K{\"{u}}gler and Marian Margraf and Ingo Naumann}, title = {Kartenleser f{\"{u}}r den neuen deutschen personalausweis - Vor- und Nachteile unterschiedlicher Lesertypen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {761--765}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0207-z}, doi = {10.1007/S11623-010-0207-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BenderKMN10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BirkRW10, author = {Dominik Birk and Helmut Reimer and Christoph Wegener}, title = {Soziale Netze - neue Impulse zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {492}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0137-9}, doi = {10.1007/S11623-010-0137-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BirkRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BirkW10, author = {Dominik Birk and Christoph Wegener}, title = {Von F(acebook) bis X(ing)}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {435}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0122-3}, doi = {10.1007/S11623-010-0122-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BirkW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BirkW10a, author = {Dominik Birk and Christoph Wegener}, title = {{\"{U}}ber den Wolken: Cloud Computing im {\"{U}}berblick}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {641--645}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0152-x}, doi = {10.1007/S11623-010-0152-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BirkW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bitz10, author = {Gunter Bitz}, title = {Integrit{\"{a}}t der Software Lieferkette - Supply chain integrity}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {183}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0031-5}, doi = {10.1007/S11623-010-0031-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BitzR10, author = {Gunter Bitz and Helmut Reimer}, title = {Softwaresicherheit - ein realistisches Ziel?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {131}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0018-2}, doi = {10.1007/S11623-010-0018-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BitzR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brandt10, author = {Jochen Brandt}, title = {Betriebsvereinbarungen als datenschutzrechtliche "{\"{O}}ffnungsklauseln"?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {213--215}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0069-4}, doi = {10.1007/S11623-010-0069-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brandt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner10, author = {Benedikt Buchner}, title = {In eigener Sache}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {3}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0001-y}, doi = {10.1007/S11623-010-0001-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner10a, author = {Benedikt Buchner}, title = {Die Einwilligung im Datenschutzrecht - - vom Rechtfertigungsgrund zum Kommerzialisierungsinstrument}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {39--43}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0010-x}, doi = {10.1007/S11623-010-0010-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner10b, author = {Benedikt Buchner}, title = {Formularm{\"{a}}{\ss}ige Einwilligung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {52}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0013-7}, doi = {10.1007/S11623-010-0013-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/CatuognoLMSSW10, author = {Luigi Catuogno and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble and Marcel Winandy}, title = {Trusted virtual domains: Color your network}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {289--294}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0089-0}, doi = {10.1007/S11623-010-0089-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Cebulla10, author = {Manuel Cebulla}, title = {Daten- und Geheimnisschutz beim Hybridbrief}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {308--313}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0093-4}, doi = {10.1007/S11623-010-0093-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Cebulla10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ChessW10, author = {Brian Chess and Jacob West}, title = {Prioritizing static analysis results}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {156--159}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0025-3}, doi = {10.1007/S11623-010-0025-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ChessW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Daubler10, author = {Wolfgang D{\"{a}}ubler}, title = {Neue Unabh{\"{a}}ngigkeit f{\"{u}}r den betrieblichen Datenschutzbeauftragten?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {20--24}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0006-6}, doi = {10.1007/S11623-010-0006-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Daubler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Diedrich10, author = {Ekkehard Diedrich}, title = {TeleTrusT European Bridge {CA:} Die Br{\"{u}}cke f{\"{u}}r sichere E-Mail Kommunikation}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {638--640}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0151-y}, doi = {10.1007/S11623-010-0151-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Diedrich10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DietrichK10, author = {Jens Dietrich and Jutta Keller{-}Herder}, title = {De-Mail - verschl{\"{u}}sselt, authentisch, nachweisbar - Mehr Sicherheit im elektronischen Nachrichtenverkehr}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {299--301}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0091-6}, doi = {10.1007/S11623-010-0091-6}, timestamp = {Mon, 18 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DietrichK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dix10, author = {Alexander Dix}, title = {Jubil{\"{a}}um f{\"{u}}r Datenschutz und Informationsfreiheit}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {134}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0020-8}, doi = {10.1007/S11623-010-0020-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dix10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Duttge10, author = {Gunnar Duttge}, title = {Das Recht auf Nichtwissen in der Medizin}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {34--38}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0009-3}, doi = {10.1007/S11623-010-0009-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Duttge10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckhardtS10, author = {Jens Eckhardt and Peter Schmitz}, title = {Informationspflicht bei "Datenschutzpannen"}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {390--397}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0112-5}, doi = {10.1007/S11623-010-0112-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EckhardtS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ernst10, author = {Stefan Ernst}, title = {Datenverlust und die Pflicht zur {\"{O}}ffentlichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {472--475}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0132-1}, doi = {10.1007/S11623-010-0132-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ernst10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fischer-HubnerIM10, author = {Simone Fischer{-}H{\"{u}}bner and Luigi Lo Iacono and Sebastian M{\"{o}}ller}, title = {Usable Security und Privacy}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {773--782}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0210-4}, doi = {10.1007/S11623-010-0210-4}, timestamp = {Wed, 10 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fischer-HubnerIM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Forst10, author = {Gerrit Forst}, title = {Grundfragen der Datenschutz-Compliance}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {160--165}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0026-2}, doi = {10.1007/S11623-010-0026-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Forst10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10, author = {Dirk Fox}, title = {Computerreservierungssysteme {(CRS)} und Passenger name Records {(PNR)}}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {257}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0079-2}, doi = {10.1007/S11623-010-0079-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10a, author = {Dirk Fox}, title = {Der Spion in der Steckdose}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {355}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0104-5}, doi = {10.1007/S11623-010-0104-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10b, author = {Dirk Fox}, title = {Smart Meter}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {408}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0115-2}, doi = {10.1007/S11623-010-0115-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10c, author = {Dirk Fox}, title = {Kryptodebatten}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {743}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0200-6}, doi = {10.1007/S11623-010-0200-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10d, author = {Dirk Fox}, title = {Webtracking}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {787}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0212-2}, doi = {10.1007/S11623-010-0212-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10e, author = {Drik Fox}, title = {Im Beta-Test}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {807}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0217-x}, doi = {10.1007/S11623-010-0217-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox10f, author = {Dirk Fox}, title = {Elektronische Gesundheitskarte}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {844}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0227-8}, doi = {10.1007/S11623-010-0227-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox10f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FoxR10, author = {Dirk Fox and Helmut Reimer}, title = {Zum Tod von Andreas Pfitzmann}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {744}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0201-5}, doi = {10.1007/S11623-010-0201-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FoxR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fuchs10, author = {Christian Fuchs}, title = {Facebook, Web 2.0 und {\"{o}}konomische {\"{U}}berwachung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {453--458}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0128-x}, doi = {10.1007/S11623-010-0128-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fuchs10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gelzhauser10, author = {Sven Gelzh{\"{a}}user}, title = {Erfolgreiches De-Mail Pilotprojekt: Teilnehmer ziehen Bilanz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {646--648}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0153-9}, doi = {10.1007/S11623-010-0153-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gelzhauser10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gietl10, author = {Andreas Gietl}, title = {Die zukunft der vorratsdatenspeicherung - Anmerkung zum Urteil des BVerfG vom 2. M{\"{a}}rz 2010}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {398--403}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0113-4}, doi = {10.1007/S11623-010-0113-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gietl10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Goetz10, author = {Christoph F.{-}J. Goetz}, title = {eHealth: Welchen Nutzen erwartet der B{\"{u}}rger?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {811--814}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0221-1}, doi = {10.1007/S11623-010-0221-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Goetz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GramlichPHT10, author = {Ludwig Gramlich and Thomas Petri and Gerrit Hornung and Marie{-}Theres Tinnefeld}, title = {Buchbesprechung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {122--125}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0050-2}, doi = {10.1007/S11623-010-0050-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GramlichPHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrevelerW10, author = {Ulrich Greveler and Christoph Wegener}, title = {Ein Ansatz zur Umsetzung von L{\"{o}}schvorschriften mittels Verschl{\"{u}}sselung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {467--471}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0131-2}, doi = {10.1007/S11623-010-0131-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrevelerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Grimm10, author = {R{\"{u}}diger Grimm}, title = {Wissen, was passiert ist}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {71}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0036-0}, doi = {10.1007/S11623-010-0036-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Grimm10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GrimmP10, author = {R{\"{u}}diger Grimm and Daniel P{\"{a}}hler}, title = {E-Mail-Forensik}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {86--89}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0041-3}, doi = {10.1007/S11623-010-0041-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GrimmP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Guneysu10, author = {Tim G{\"{u}}neysu}, title = {Kryptografie auf programmierbarer Hardware}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {832--837}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0225-x}, doi = {10.1007/S11623-010-0225-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Guneysu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HaaseHK10, author = {Martin Sebastian Haase and Thorsten Heermann and Christian Kl{\"{u}}gel}, title = {Blutuntersuchungen im Bewerbungsverfahren}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {819--823}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0223-z}, doi = {10.1007/S11623-010-0223-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HaaseHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HanacekD10, author = {Petr Han{\'{a}}cek and Martin Drahansk{\'{y}}}, title = {Analyse sicherer Hardwarel{\"{o}}sungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {766--770}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0208-y}, doi = {10.1007/S11623-010-0208-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HanacekD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HansenT10, author = {Marit Hansen and Sven Thomsen}, title = {Lebenslanger Datenschutz: Anforderungen an vertrauensw{\"{u}}rdige Infrastrukturen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {283--288}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0088-1}, doi = {10.1007/S11623-010-0088-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HansenT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeibeyQ10, author = {Hanns{-}Wilhelm Heibey and Gisela Quiring{-}Kock}, title = {Biometrische Authentisierung - M{\"{o}}glichkeiten und Grenzen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {332--333}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0099-y}, doi = {10.1007/S11623-010-0099-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeibeyQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeidrichW10, author = {Joerg Heidrich and Christoph Wegener}, title = {Datenschutzrechtliche Aspekte bei der weitergabe von IP-Adressen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {172--177}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0028-0}, doi = {10.1007/S11623-010-0028-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeidrichW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HeinsonYFWS10, author = {Dennis Heinson and York Yannikos and Frederik Franke and Christian Winter and Markus Schneider}, title = {Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen - Methoden zur Aufkl{\"{a}}rung verbotener Handlungen im Spannungsfeld rechtlicher Interessen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {75--79}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0039-x}, doi = {10.1007/S11623-010-0039-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HeinsonYFWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Helmbrecht10, author = {Udo Helmbrecht}, title = {Data protection and legal compliance in cloud computing}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {554--556}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0189-x}, doi = {10.1007/S11623-010-0189-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Helmbrecht10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hemker10, author = {Thomas Hemker}, title = {Kann das jeder? - Ja, eigentlich schon!}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {626--629}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0148-6}, doi = {10.1007/S11623-010-0148-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hemker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hoeren10, author = {Thomas Hoeren}, title = {Das neue {BDSG} und die Auftragsdatenverarbeitung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {688--691}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0167-3}, doi = {10.1007/S11623-010-0167-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hoeren10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HoerenV10, author = {Thomas Hoeren and Gottfried Vossen}, title = {Die Rolle des Rechts in einer durch das Web 2.0 dominierten Welt}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {463--466}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0130-3}, doi = {10.1007/S11623-010-0130-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HoerenV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Holtz10, author = {Leif{-}Erik Holtz}, title = {Datenschutzkonformes Social Networking: Clique und Scramble!}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {439--443}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0125-0}, doi = {10.1007/S11623-010-0125-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Holtz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jendrian10, author = {Kai Jendrian}, title = {Web-Schutz-Baukasten f{\"{u}}r Firefox - Sicheres Surfen trotz aktiver Inhalte}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {48--51}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0012-8}, doi = {10.1007/S11623-010-0012-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jendrian10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jendrian10a, author = {Kai Jendrian}, title = {{\"{U}}berpr{\"{u}}fung von Webanwendungen mit dem "OWASP Application Security Verification Standard 2009"}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {138--142}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0022-6}, doi = {10.1007/S11623-010-0022-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jendrian10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/JendrianW10, author = {Kai Jendrian and Christoph Weinmann}, title = {Daten und Informationen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {108}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0046-y}, doi = {10.1007/S11623-010-0046-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/JendrianW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Junker10, author = {Holger Junker}, title = {Sicherheit {\&} {SOA} in der Bundesverwaltung - Sicherheit Service-orientierter Architekturen am Beispiel modernen E-Governments}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {649--651}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0154-8}, doi = {10.1007/S11623-010-0154-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Junker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kampffmeyer10, author = {Ulrich Kampffmeyer}, title = {E-Mail Compliance - revisionssichere Archivierung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {619--625}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0147-7}, doi = {10.1007/S11623-010-0147-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kampffmeyer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg10, author = {Moritz Karg}, title = {Datenschutzrechtliche Rahmenbedingungen beim Einsatz intelligenter Z{\"{a}}hler}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {365--372}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0108-1}, doi = {10.1007/S11623-010-0108-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Karg10a, author = {Moritz Karg}, title = {Datenschutz f{\"{u}}r Geodaten - Bedarfs es eines datenschutzrechtlichen Rubikons bei der digitalen Erfassung des {\"{o}}ffentlichen Raumes?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {824--831}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0224-y}, doi = {10.1007/S11623-010-0224-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Karg10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KarperM10, author = {Irene Karper and S{\"{o}}nke Maseberg}, title = {Zertifikat f{\"{u}}r Datenschutz-Management}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {704--708}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0170-8}, doi = {10.1007/S11623-010-0170-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KarperM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kirchberg-LennartzW10, author = {Barbara Kirchberg{-}Lennartz and J{\"{u}}rgen Weber}, title = {Ist die IP-Adresse ein personenbezogenes Datum?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {479--481}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0134-z}, doi = {10.1007/S11623-010-0134-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kirchberg-LennartzW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kleinert10, author = {Christian Alexander Kleinert}, title = {Datenschutzaspekte bei der Abrechnung von Patientendaten}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {240--245}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0075-6}, doi = {10.1007/S11623-010-0075-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kleinert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Klingbeil10, author = {J{\"{o}}rg Klingbeil}, title = {79. Datenschutzkonferenz in Stuttgart}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {282}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0087-2}, doi = {10.1007/S11623-010-0087-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Klingbeil10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Knopp10, author = {Michael Knopp}, title = {WLAN-Haftung - Anmerkung zum Urteil des {BGH} vom 12. Mai 2010}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {653--655}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0156-6}, doi = {10.1007/S11623-010-0156-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Knopp10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Knopp10a, author = {Michael Knopp}, title = {Datenschutzherausforderung Webtracking}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {783--786}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0211-3}, doi = {10.1007/S11623-010-0211-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Knopp10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koppen10, author = {Hajo K{\"{o}}ppen}, title = {Entwicklung der Computer-, IuK- und Internetkriminalit{\"{a}}t im Jahr 2009 - Polizeiliche Kriminalstatistik 2009 verzeichnet erneut Anstieg der Computerkriminalit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {771--772}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0209-x}, doi = {10.1007/S11623-010-0209-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koppen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KoyE10, author = {Henrik Koy and Bernhard Esslinger}, title = {TeleTrusT European Bridge {CA} - Die European Bridge {CA} als Enabler f{\"{u}}r sichere E-Mail mit {S/MIME} zwischen Unternehmen und Beh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {318--322}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0095-2}, doi = {10.1007/S11623-010-0095-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KoyE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LaueS10, author = {Philip Laue and Oliver Stiemerling}, title = {Identit{\"{a}}ts- und Zugriffsmanagement f{\"{u}}r Cloud Computing Anwendungen - Technisch-organisatorische Probleme, Rechtliche Risiken und L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {692--697}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0168-2}, doi = {10.1007/S11623-010-0168-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LaueS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LepperhoffPT10, author = {Niels Lepperhoff and Bj{\"{o}}rn Petersdorf and Sabine Thursch}, title = {Messung des Datenschutz-Vollzugsdefizits}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {716--720}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0173-5}, doi = {10.1007/S11623-010-0173-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LepperhoffPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Leutheusser-Schnarrenberger10, author = {Sabine Leutheusser{-}Schnarrenberger}, title = {Grundrechtsschutz im Europa des Lissaboner Vertrags - Trends und Perspektiven}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {519--522}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0182-4}, doi = {10.1007/S11623-010-0182-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Leutheusser-Schnarrenberger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lindhorst10, author = {Matthias Lindhorst}, title = {Wettbewerbsrecht und datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {713--715}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0172-6}, doi = {10.1007/S11623-010-0172-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lindhorst10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lipman10, author = {Maria Lipman}, title = {Russia's Media: Freedom of expression, but no press freedom}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {529--534}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0184-2}, doi = {10.1007/S11623-010-0184-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lipman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lipner10, author = {Steve Lipner}, title = {Security development lifecycle - Security considerations for client and cloud Applications}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {135--137}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0021-7}, doi = {10.1007/S11623-010-0021-7}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lipner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MainuschB10, author = {Johannes Mainusch and Christian Burtchen}, title = {Kontrolle {\"{u}}ber eigene Daten in sozialen Netzwerken}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {448--452}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0127-y}, doi = {10.1007/S11623-010-0127-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MainuschB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Makulilo10, author = {Alex B. Makulilo}, title = {'You must take medical test' - Do employers Intrude into Prospective Employees' Privacy?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {571--575}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0193-1}, doi = {10.1007/S11623-010-0193-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Makulilo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/McGinley10, author = {Marie McGinley}, title = {Die Verarbeitung von Fluggastdaten f{\"{u}}r Strafverfolgungszwecke - Das geplante {EU} {PNR} System}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {250--253}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0077-4}, doi = {10.1007/S11623-010-0077-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/McGinley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mertes10, author = {Paul E. Mertes}, title = {E-Mails im Rechtsverkehr: keine Lappalie}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {633--637}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0150-z}, doi = {10.1007/S11623-010-0150-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mertes10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester10, author = {Britta Alexandra Mester}, title = {Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {203}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0065-8}, doi = {10.1007/S11623-010-0065-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester10a, author = {Britta Alexandra Mester}, title = {Rechnen in der Wolke}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {675}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0163-7}, doi = {10.1007/S11623-010-0163-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Meyerholt10, author = {Ulrich Meyerholt}, title = {Das Bundesverfassungsgericht}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {721}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0174-4}, doi = {10.1007/S11623-010-0174-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Meyerholt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muglich10, author = {Andreas M{\"{u}}glich}, title = {Wanckel, Endress: foto- und Bildrecht, 3. Aufl. - M{\"{u}}nchen 2009, S.398, {ISBN} 978-3-406-58102-1}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {350}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0119-y}, doi = {10.1007/S11623-010-0119-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muglich10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muglich10a, author = {Andreas M{\"{u}}glich}, title = {Marly, Jochen: Praxishandbuch Softwarerecht - Rechtsschutz und Vertragsgestaltung - 5. Aufl. M{\"{u}}nchen 2009, S.1104, {ISBN} 978-3-406-59222-5, 128 Euro}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {430}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0118-z}, doi = {10.1007/S11623-010-0118-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muglich10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muller10, author = {Klaus J. M{\"{u}}ller}, title = {Gewinnung von Verhaltensprofilen am intelligenten Stromz{\"{a}}hler}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {359--364}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0107-2}, doi = {10.1007/S11623-010-0107-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muller10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Naumann10, author = {Tino Naumann}, title = {S{\"{a}}chsischer Datenschutzbeauftragter unterst{\"{u}}tzt die Datenschutzbeh{\"{o}}rde von Bosnien-Herzegowina}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {6}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0003-9}, doi = {10.1007/S11623-010-0003-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Naumann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/NohlT10, author = {Karsten Nohl and Erik Tews}, title = {Kann man mit {DECT} noch vertraulich telefonieren?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {758--760}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0206-0}, doi = {10.1007/S11623-010-0206-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/NohlT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ozbek10, author = {Hakan {\"{O}}zbek}, title = {Datenschutz konformer Einsatz von E-Discovery Systemen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {576--580}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0194-0}, doi = {10.1007/S11623-010-0194-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ozbek10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ozdemir10, author = {Hayrunnisa {\"{O}}zdemir}, title = {Der Schutz personenbezogener Daten in der T{\"{u}}rkei}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {566--570}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0192-2}, doi = {10.1007/S11623-010-0192-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ozdemir10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri10, author = {Thomas Petri}, title = {Wertewandel im Datenschutz und die Grundrechte}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {25--29}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0007-5}, doi = {10.1007/S11623-010-0007-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri10a, author = {Thomas Petri}, title = {Sicherheit und Selbstbestimmung - - deutsche und europ{\"{a}}ische Diskurse zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {539--543}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0186-0}, doi = {10.1007/S11623-010-0186-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PetriS10, author = {Thomas Petri and Peter Schaar}, title = {Aus Den Datenschutzbeh{\"{o}}rden}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {206}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0067-6}, doi = {10.1007/S11623-010-0067-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PetriS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann10, author = {Norbert Pohlmann}, title = {Bedrohungen und Herausforderungen des E-Mail-Dienstes - Die Sicherheitsrisiken des E-Mail-Dienstes im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {607--613}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0145-9}, doi = {10.1007/S11623-010-0145-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pohlmann10a, author = {Norbert Pohlmann}, title = {Wie zuverl{\"{a}}ssig ist die E-Mail-Anwendung?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {656}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0157-5}, doi = {10.1007/S11623-010-0157-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pohlmann10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PohlmannR10, author = {Norbert Pohlmann and Helmut Reimer}, title = {E-Mail Compliance - Wunsch und Wirklichkeit}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {603}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0142-z}, doi = {10.1007/S11623-010-0142-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PohlmannR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PolenzT10, author = {Sven Polenz and Sven Thomsen}, title = {Internet- und E-Mail-Nutzung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {614--618}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0146-8}, doi = {10.1007/S11623-010-0146-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PolenzT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Poschmann10, author = {Axel Poschmann}, title = {Lightweight Blockchiffren - Verschl{\"{u}}sselung fast ohne Energie}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {747--752}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0204-2}, doi = {10.1007/S11623-010-0204-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Poschmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Quiring-Kock10, author = {Gisela Quiring{-}Kock}, title = {Zertifizierungen und ihre Bedeutung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {178--181}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0029-z}, doi = {10.1007/S11623-010-0029-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Quiring-Kock10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Raabe10, author = {Oliver Raabe}, title = {Datenschutz im Smartgrid - Anpassungsbedarf des Rechts und des Systemdatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {379--386}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0110-7}, doi = {10.1007/S11623-010-0110-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Raabe10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RassS10, author = {Stefan Rass and Peter Schartner}, title = {Quantenkryptographie - {\"{U}}berblick und aktuelle Entwicklungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {753--757}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0205-1}, doi = {10.1007/S11623-010-0205-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/RassS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer10, author = {Helmut Reimer}, title = {20. SIT-SmartCard-Workshop, 2.-3.02.2010 in Darmstadt}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {272--273}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0082-7}, doi = {10.1007/S11623-010-0082-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer10a, author = {Helmut Reimer}, title = {Veranstaltungsbesprechung - 19. {RSA} Conference, 01. - 05.03.2010 in San francisco, {USA}}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {348--350}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0103-6}, doi = {10.1007/S11623-010-0103-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer10b, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {422--430}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0117-0}, doi = {10.1007/S11623-010-0117-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerR10, author = {Helmut Reimer and Karl Rihaczek}, title = {Zur Erinnerung an Eckart Raubold}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {808}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0218-9}, doi = {10.1007/S11623-010-0218-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reiners10, author = {Wilfried Reiners}, title = {E-Mail Compliance fordert E-Mail Richtlinie - Der Umgang mit E-Mails zwischen Datensicherheit und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {630--632}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0149-5}, doi = {10.1007/S11623-010-0149-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reiners10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10, author = {Karl Rihaczek}, title = {Stolz, Gl{\"{u}}ck, Unvernunft}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {5}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0002-x}, doi = {10.1007/S11623-010-0002-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10a, author = {Karl Rihaczek}, title = {Der Stein von Rosette}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {73}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0037-z}, doi = {10.1007/S11623-010-0037-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10b, author = {Karl Rihaczek}, title = {33 {DAFTA} Datenschutzfachtagung der {GDD} Gesellschaft f{\"{u}}r Datenschutz und Datensicherung am 19/20.11.2008 im Maternushaus, K{\"{o}}ln}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {121--122}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0049-8}, doi = {10.1007/S11623-010-0049-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10c, author = {Karl Rihaczek}, title = {Daten und Information}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {133}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0019-1}, doi = {10.1007/S11623-010-0019-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10d, author = {Karl Rihaczek}, title = {Informatik}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {205}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0066-7}, doi = {10.1007/S11623-010-0066-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10e, author = {Karl Rihaczek}, title = {Falsch verortet}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {281}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0086-3}, doi = {10.1007/S11623-010-0086-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10f, author = {Karl Rihaczek}, title = {Ziel oder Ende}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {357}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0105-4}, doi = {10.1007/S11623-010-0105-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10g, author = {Karl Rihaczek}, title = {Die Datenschutzerkl{\"{a}}rung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {437}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0123-2}, doi = {10.1007/S11623-010-0123-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10h, author = {Karl Rihaczek}, title = {Anders gekommen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {517}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0180-6}, doi = {10.1007/S11623-010-0180-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10i, author = {Karl Rihaczek}, title = {Wikipedia}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {9}, pages = {605}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0143-y}, doi = {10.1007/S11623-010-0143-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10j, author = {Karl Rihaczek}, title = {ElENA}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {677}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0164-6}, doi = {10.1007/S11623-010-0164-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10k, author = {Karl Rihaczek}, title = {Ethischer Fortschritt}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {11}, pages = {745}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0202-4}, doi = {10.1007/S11623-010-0202-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek10l, author = {Karl Rihaczek}, title = {Street View}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {809}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0219-8}, doi = {10.1007/S11623-010-0219-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek10l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rogowicz10, author = {Eva Rogowicz}, title = {Die entwicklung der europ{\"{a}}ischen asyl- und Fl{\"{u}}chtlingspolitik und ihre datenschutzrechtlichen Rahmenbedingungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {562--565}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0191-3}, doi = {10.1007/S11623-010-0191-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rogowicz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ronellenfitsch10, author = {Michael Ronellenfitsch}, title = {Rechtsgutachten zur Neugestaltung der Datenschutzkontrolle in Hessen - Beitrag zur Kl{\"{a}}rung der Konsequenzen aus dem Urteil des EuGH vom 9. M{\"{a}}rz 2010}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {438}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0124-1}, doi = {10.1007/S11623-010-0124-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ronellenfitsch10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rossnagel10, author = {Alexander Ro{\ss}nagel}, title = {Das Bundesverfassungsgericht und die Vorratsdatenspeicherung in Europa}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {544--548}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0187-z}, doi = {10.1007/S11623-010-0187-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rossnagel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelJ10, author = {Alexander Ro{\ss}nagel and Silke Jandt}, title = {Datenschutzkonformes Energieinformationsnetz - Risiken und Gestaltungsvorschl{\"{a}}ge}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {373--378}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0109-0}, doi = {10.1007/S11623-010-0109-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RossnagelJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ruggieri10, author = {Franco Ruggieri}, title = {Registered e-mail {(REM)} - Reliable e-mail for everybody}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {314--317}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0094-3}, doi = {10.1007/S11623-010-0094-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ruggieri10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Saeltzer10, author = {Gerhard Saeltzer}, title = {Little Brothers are watching you - Geheime Verbrauchserfassung in Wohnungen per Funk und andere {\"{u}}ble {\"{U}}berraschungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {387--389}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0111-6}, doi = {10.1007/S11623-010-0111-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Saeltzer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schaar10, author = {Peter Schaar}, title = {Ein Datenschutzrecht f{\"{u}}r das 21. Jahrhundert}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {518}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0181-5}, doi = {10.1007/S11623-010-0181-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schaar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schafer10, author = {Burkhard Schafer}, title = {The {UK} Cleanfeed system - Lessons for the German debate?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {535--538}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0185-1}, doi = {10.1007/S11623-010-0185-1}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schafer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schild10, author = {Hans{-}Hermann Schild}, title = {Die v{\"{o}}llige Unabh{\"{a}}ngigkeit der Aufsichtsbeh{\"{o}}rden aus europarechtlicher Sicht - - zugleich {\"{U}}berlegungen, die bestehende Vertragsverletzung im Bereich der Kontrollbeh{\"{o}}rden nach Art.28 EG-DS-RiLi der Bundesrepublik Deutschland endlich zu beenden}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {549--553}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0188-y}, doi = {10.1007/S11623-010-0188-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schild10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmidlK10, author = {Michael Schmidl and Daniel Krone}, title = {Standardvertragsklauseln als Basis intra-europ{\"{a}}ischer Auftragsdatenverarbeitung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {838--843}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0226-9}, doi = {10.1007/S11623-010-0226-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchmidlK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schmidt10, author = {Bernd Schmidt}, title = {Besch{\"{a}}ftigtendatenschutz in {\textsection} 32 {BDSG} - Perspektiven einer vorl{\"{a}}ufigen Regelung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {207--212}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0068-5}, doi = {10.1007/S11623-010-0068-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schmidt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schroder10, author = {Nils Schr{\"{o}}der}, title = {Privatsph{\"{a}}re mit System}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {74}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0038-y}, doi = {10.1007/S11623-010-0038-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schroder10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz10, author = {S{\"{o}}nke E. Schulz}, title = {Informations- und Kommunikationstechnologie als Grundversorgung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {698--702}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0169-1}, doi = {10.1007/S11623-010-0169-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schumacher10, author = {Astrid Schumacher}, title = {Akkreditierung und Zertifizierung von De-Mail-Diensteanbietern - Eine {\"{U}}bersicht {\"{u}}ber die technischen Vorgaben zur Gew{\"{a}}hrleistung der sicheren Kommunikationsinfrastruktur}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {302--307}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0092-5}, doi = {10.1007/S11623-010-0092-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schumacher10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schumann10, author = {David Schumann}, title = {Anonymit{\"{a}}t bewahrendes Data Mining}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {709--712}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0171-7}, doi = {10.1007/S11623-010-0171-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schumann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seeger10, author = {Mark M. Seeger}, title = {Three years hacker paragraph - {A} review}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {476--478}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0133-0}, doi = {10.1007/S11623-010-0133-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seeger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Siman10, author = {Maty Siman}, title = {Platform for application risk intelligence - Using source code understanding as a risk barometer}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {143--148}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0023-5}, doi = {10.1007/S11623-010-0023-5}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Siman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Sowa10, author = {Aleksandra Sowa}, title = {IT-relevante Aspekte einer Pr{\"{u}}fung von Datenschutz-Compliance}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {104--107}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0045-z}, doi = {10.1007/S11623-010-0045-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Sowa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Starosta10, author = {Justyna Starosta}, title = {Transnationaler Datenaustausch zur Terrorismusbek{\"{a}}mpfung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {236--239}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0074-7}, doi = {10.1007/S11623-010-0074-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Starosta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/StopferBE10, author = {Juliane M. Stopfer and Mitja D. Back and Boris Egloff}, title = {Pers{\"{o}}nlichkeit 2.0 - Genauigkeit von Pers{\"{o}}nlichkeitsurteilen anhand von Online Social Network-Profilen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {459--462}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0129-9}, doi = {10.1007/S11623-010-0129-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/StopferBE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Strauss10, author = {Stefan Strau{\ss}}, title = {Datenschutzimplikationen staatlicher Identit{\"{a}}tsmanagement-Systeme - Fallbeispiel {\"{O}}sterreich}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {99--103}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0044-0}, doi = {10.1007/S11623-010-0044-0}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Strauss10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Taeger10, author = {J{\"{u}}rgen Taeger}, title = {Informationspflicht {\"{u}}ber den datenschutz im M-commerce}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {246--249}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0076-5}, doi = {10.1007/S11623-010-0076-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Taeger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Thiel10, author = {Christoph Thiel}, title = {Business Continuity Management f{\"{u}}r {KMU}}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {6}, pages = {404--407}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0114-3}, doi = {10.1007/S11623-010-0114-3}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Thiel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld10, author = {Marie{-}Theres Tinnefeld}, title = {Stopp-Schilder im Internet - Beunruhigende Fragen im Kampf gegen Kinderpornografie}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {15--19}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0005-7}, doi = {10.1007/S11623-010-0005-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB10, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Datenschutz international}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {515}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0179-z}, doi = {10.1007/S11623-010-0179-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB10a, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {V{\"{o}}llige unabh{\"{a}}ngigkeit der datenschutzkontrolle}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {581--582}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0195-z}, doi = {10.1007/S11623-010-0195-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldGJ10, author = {Marie{-}Theres Tinnefeld and Ludwig Gramlich and Kai Jendrian}, title = {Buchbesprechung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {508--510}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0140-1}, doi = {10.1007/S11623-010-0140-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldS10, author = {Marie{-}Theres Tinnefeld and Wolfgang Schmale}, title = {Identit{\"{a}}t durch Grundrechte}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {523--528}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0183-3}, doi = {10.1007/S11623-010-0183-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Volker10, author = {J{\"{o}}rg V{\"{o}}lker}, title = {iPhone Security}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {486--491}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0136-x}, doi = {10.1007/S11623-010-0136-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Volker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WachterM10, author = {Michael W{\"{a}}chter and Andreas M{\"{u}}glich}, title = {Buchbesprechung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {273--274}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0083-6}, doi = {10.1007/S11623-010-0083-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WachterM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner10, author = {Edgar Wagner}, title = {Datenschutz bei Kundenkarten}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {30--33}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0008-4}, doi = {10.1007/S11623-010-0008-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner10a, author = {Edgar Wagner}, title = {Datenschutz als Bildungsaufgabe}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {8}, pages = {557--561}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0190-4}, doi = {10.1007/S11623-010-0190-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Warga10, author = {Norbert Warga}, title = {Das Elena-Konzept}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {216--220}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0070-y}, doi = {10.1007/S11623-010-0070-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Warga10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener10, author = {Christoph Wegener}, title = {Vertrauensgrundlagen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {279}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0085-4}, doi = {10.1007/S11623-010-0085-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener10a, author = {Christoph Wegener}, title = {Was schafft eigentlich Vertrauensw{\"{u}}rdigkeit?}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {5}, pages = {334}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0100-9}, doi = {10.1007/S11623-010-0100-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert10, author = {Thilo Weichert}, title = {Dauerbrenner BDSG-Novellierung}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {1}, pages = {7--14}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0004-8}, doi = {10.1007/S11623-010-0004-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert10a, author = {Thilo Weichert}, title = {Cloud Computing und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {10}, pages = {679--687}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0166-4}, doi = {10.1007/S11623-010-0166-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert10b, author = {Thilo Weichert}, title = {Regulierung personenbezogener Internet-Ver{\"{o}}ffentlichungen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {12}, pages = {810}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0220-2}, doi = {10.1007/S11623-010-0220-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weiss10, author = {Stefan Weiss}, title = {Datenschutz Compliance in Sozialen Netzwerk anwendungen - Voraussetzungen f{\"{u}}r die technische Umsetzbarkeit}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {7}, pages = {444--447}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0126-z}, doi = {10.1007/S11623-010-0126-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weiss10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wiele10, author = {Johannes Wiele}, title = {Gesetze als Vorbild f{\"{u}}r Security Policies}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {166--171}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0027-1}, doi = {10.1007/S11623-010-0027-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wiele10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wrede10, author = {Ann{-}Karina Wrede}, title = {Rechtliche Einordnung von Webcams}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {225--228}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0072-9}, doi = {10.1007/S11623-010-0072-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wrede10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WysopalES10, author = {Chris Wysopal and Chris Eng and Tyler Shields}, title = {Static detection of application backdoors - Detecting both malicious software behavior and malicious indicators from the static analysis of executable code}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {3}, pages = {149--155}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0024-4}, doi = {10.1007/S11623-010-0024-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WysopalES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X10, title = {Arbeitskreis "Datenschutz in Recht und Praxis" im BvD e. {V.:} Eine Frage der Erforderlichkeit - Zwischenruf von Praktikern zum {\textsection} 32 {BDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {254--256}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0078-3}, doi = {10.1007/S11623-010-0078-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/YannikosWFS10, author = {York Yannikos and Christian Winter and Frederik Franke and Markus Schneider}, title = {Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {90--95}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0042-2}, doi = {10.1007/S11623-010-0042-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/YannikosWFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZikeschR10, author = {Philipp Zikesch and Bernd Reimer}, title = {Datenschutz und pr{\"{a}}ventive Korruptionsbek{\"{a}}mpfung - kein Zielkonflikt}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {2}, pages = {96--98}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0043-1}, doi = {10.1007/S11623-010-0043-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ZikeschR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zilkens10, author = {Martin Zilkens}, title = {Datenschutz im Ausl{\"{a}}nderwesen}, journal = {Datenschutz und Datensicherheit}, volume = {34}, number = {4}, pages = {229--235}, year = {2010}, url = {https://doi.org/10.1007/s11623-010-0073-8}, doi = {10.1007/S11623-010-0073-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zilkens10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.