Search dblp for Publications

export results for "toc:db/journals/dud/dud34.bht:"

 download as .bib file

@article{DBLP:journals/dud/Albrecht10,
  author       = {Florian Albrecht},
  title        = {Schliesky, Utz (Hrsg.): Kommentar zum Gesetz {\"{u}}ber Personalausweise
                  und den elektronischen Identit{\"{a}}tsausweis, Verlag des Lorenz-von-Stein-Instituts
                  f{\"{u}}r Verwaltungswissenschaften an der Christian-Albrechts-Universit{\"{a}}t
                  zu Kiel - Kiel 2009, 227 S., {ISBN} 978-3-936773-48-4. {\mbox{\texteuro}}
                  39.-},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {350},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0120-5},
  doi          = {10.1007/S11623-010-0120-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Albrecht10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Alich10,
  author       = {Stefan Alich},
  title        = {"Task Force" im Kinosaal - Zur datenschutzrechtlichen Zul{\"{a}}ssigkeit
                  des Einsatzes von Nachtsichtger{\"{a}}ten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {44--47},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0011-9},
  doi          = {10.1007/S11623-010-0011-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Alich10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BackerFS10,
  author       = {Matthias B{\"{a}}cker and
                  Felix C. Freiling and
                  Sven Schmitt},
  title        = {Selektion vor der Sicherung - Methoden zur effizienten forensischen
                  Sicherung von digitalen Speichermedien},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {80--85},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0040-4},
  doi          = {10.1007/S11623-010-0040-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BackerFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BalfanzL10,
  author       = {Judith Balfanz and
                  Philip Laue},
  title        = {Transformation und elektronische Patientenakte - Beweiswerterhaltung
                  und Risikominimierung bei der Transformation medizinischer Unterlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {815--818},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0222-0},
  doi          = {10.1007/S11623-010-0222-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BalfanzL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Barnitzke10,
  author       = {Benno Barnitzke},
  title        = {Herausgabe von IP-Adressen - Eine datenschutzrechtliche Bewertung
                  der Entscheidung des {OLG} Hamburg, Urteil vom 2.7.2008 - 5 {U} 73/07},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {482--485},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0135-y},
  doi          = {10.1007/S11623-010-0135-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Barnitzke10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BednerA10,
  author       = {Mark Bedner and
                  Tobias Ackermann},
  title        = {Schutzziele der IT-Sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {323--328},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0096-1},
  doi          = {10.1007/S11623-010-0096-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BednerA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeisenherzT10,
  author       = {Gerhard Beisenherz and
                  Marie{-}Theres Tinnefeld},
  title        = {Sozialdatenschutz - eine Frage des Besch{\"{a}}ftigtendatenschutzes?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {221--224},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0071-x},
  doi          = {10.1007/S11623-010-0071-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeisenherzT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BenderKMN10,
  author       = {Jens Bender and
                  Dennis K{\"{u}}gler and
                  Marian Margraf and
                  Ingo Naumann},
  title        = {Das Sperrmanagement im neuen deutschen Personalausweis - Sperrmanagement
                  ohne globale chipindividuelle Merkmale},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {295--298},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0090-7},
  doi          = {10.1007/S11623-010-0090-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BenderKMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BenderKMN10a,
  author       = {Jens Bender and
                  Dennis K{\"{u}}gler and
                  Marian Margraf and
                  Ingo Naumann},
  title        = {Kartenleser f{\"{u}}r den neuen deutschen personalausweis - Vor-
                  und Nachteile unterschiedlicher Lesertypen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {761--765},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0207-z},
  doi          = {10.1007/S11623-010-0207-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BenderKMN10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BirkRW10,
  author       = {Dominik Birk and
                  Helmut Reimer and
                  Christoph Wegener},
  title        = {Soziale Netze - neue Impulse zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {492},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0137-9},
  doi          = {10.1007/S11623-010-0137-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BirkRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BirkW10,
  author       = {Dominik Birk and
                  Christoph Wegener},
  title        = {Von F(acebook) bis X(ing)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {435},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0122-3},
  doi          = {10.1007/S11623-010-0122-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BirkW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BirkW10a,
  author       = {Dominik Birk and
                  Christoph Wegener},
  title        = {{\"{U}}ber den Wolken: Cloud Computing im {\"{U}}berblick},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {641--645},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0152-x},
  doi          = {10.1007/S11623-010-0152-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BirkW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bitz10,
  author       = {Gunter Bitz},
  title        = {Integrit{\"{a}}t der Software Lieferkette - Supply chain integrity},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {183},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0031-5},
  doi          = {10.1007/S11623-010-0031-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bitz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BitzR10,
  author       = {Gunter Bitz and
                  Helmut Reimer},
  title        = {Softwaresicherheit - ein realistisches Ziel?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {131},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0018-2},
  doi          = {10.1007/S11623-010-0018-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BitzR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brandt10,
  author       = {Jochen Brandt},
  title        = {Betriebsvereinbarungen als datenschutzrechtliche "{\"{O}}ffnungsklauseln"?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {213--215},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0069-4},
  doi          = {10.1007/S11623-010-0069-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brandt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner10,
  author       = {Benedikt Buchner},
  title        = {In eigener Sache},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {3},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0001-y},
  doi          = {10.1007/S11623-010-0001-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner10a,
  author       = {Benedikt Buchner},
  title        = {Die Einwilligung im Datenschutzrecht - - vom Rechtfertigungsgrund
                  zum Kommerzialisierungsinstrument},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {39--43},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0010-x},
  doi          = {10.1007/S11623-010-0010-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner10b,
  author       = {Benedikt Buchner},
  title        = {Formularm{\"{a}}{\ss}ige Einwilligung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {52},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0013-7},
  doi          = {10.1007/S11623-010-0013-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/CatuognoLMSSW10,
  author       = {Luigi Catuogno and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble and
                  Marcel Winandy},
  title        = {Trusted virtual domains: Color your network},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {289--294},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0089-0},
  doi          = {10.1007/S11623-010-0089-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/CatuognoLMSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Cebulla10,
  author       = {Manuel Cebulla},
  title        = {Daten- und Geheimnisschutz beim Hybridbrief},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {308--313},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0093-4},
  doi          = {10.1007/S11623-010-0093-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Cebulla10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ChessW10,
  author       = {Brian Chess and
                  Jacob West},
  title        = {Prioritizing static analysis results},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {156--159},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0025-3},
  doi          = {10.1007/S11623-010-0025-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ChessW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Daubler10,
  author       = {Wolfgang D{\"{a}}ubler},
  title        = {Neue Unabh{\"{a}}ngigkeit f{\"{u}}r den betrieblichen Datenschutzbeauftragten?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {20--24},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0006-6},
  doi          = {10.1007/S11623-010-0006-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Daubler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Diedrich10,
  author       = {Ekkehard Diedrich},
  title        = {TeleTrusT European Bridge {CA:} Die Br{\"{u}}cke f{\"{u}}r
                  sichere E-Mail Kommunikation},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {638--640},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0151-y},
  doi          = {10.1007/S11623-010-0151-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Diedrich10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DietrichK10,
  author       = {Jens Dietrich and
                  Jutta Keller{-}Herder},
  title        = {De-Mail - verschl{\"{u}}sselt, authentisch, nachweisbar - Mehr
                  Sicherheit im elektronischen Nachrichtenverkehr},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {299--301},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0091-6},
  doi          = {10.1007/S11623-010-0091-6},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DietrichK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dix10,
  author       = {Alexander Dix},
  title        = {Jubil{\"{a}}um f{\"{u}}r Datenschutz und Informationsfreiheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {134},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0020-8},
  doi          = {10.1007/S11623-010-0020-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dix10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Duttge10,
  author       = {Gunnar Duttge},
  title        = {Das Recht auf Nichtwissen in der Medizin},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {34--38},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0009-3},
  doi          = {10.1007/S11623-010-0009-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Duttge10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckhardtS10,
  author       = {Jens Eckhardt and
                  Peter Schmitz},
  title        = {Informationspflicht bei "Datenschutzpannen"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {390--397},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0112-5},
  doi          = {10.1007/S11623-010-0112-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EckhardtS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ernst10,
  author       = {Stefan Ernst},
  title        = {Datenverlust und die Pflicht zur {\"{O}}ffentlichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {472--475},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0132-1},
  doi          = {10.1007/S11623-010-0132-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ernst10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fischer-HubnerIM10,
  author       = {Simone Fischer{-}H{\"{u}}bner and
                  Luigi Lo Iacono and
                  Sebastian M{\"{o}}ller},
  title        = {Usable Security und Privacy},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {773--782},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0210-4},
  doi          = {10.1007/S11623-010-0210-4},
  timestamp    = {Wed, 10 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fischer-HubnerIM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Forst10,
  author       = {Gerrit Forst},
  title        = {Grundfragen der Datenschutz-Compliance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {160--165},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0026-2},
  doi          = {10.1007/S11623-010-0026-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Forst10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10,
  author       = {Dirk Fox},
  title        = {Computerreservierungssysteme {(CRS)} und Passenger name Records {(PNR)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {257},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0079-2},
  doi          = {10.1007/S11623-010-0079-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10a,
  author       = {Dirk Fox},
  title        = {Der Spion in der Steckdose},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {355},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0104-5},
  doi          = {10.1007/S11623-010-0104-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10b,
  author       = {Dirk Fox},
  title        = {Smart Meter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {408},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0115-2},
  doi          = {10.1007/S11623-010-0115-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10c,
  author       = {Dirk Fox},
  title        = {Kryptodebatten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {743},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0200-6},
  doi          = {10.1007/S11623-010-0200-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10d,
  author       = {Dirk Fox},
  title        = {Webtracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {787},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0212-2},
  doi          = {10.1007/S11623-010-0212-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10e,
  author       = {Drik Fox},
  title        = {Im Beta-Test},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {807},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0217-x},
  doi          = {10.1007/S11623-010-0217-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox10f,
  author       = {Dirk Fox},
  title        = {Elektronische Gesundheitskarte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {844},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0227-8},
  doi          = {10.1007/S11623-010-0227-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox10f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FoxR10,
  author       = {Dirk Fox and
                  Helmut Reimer},
  title        = {Zum Tod von Andreas Pfitzmann},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {744},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0201-5},
  doi          = {10.1007/S11623-010-0201-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FoxR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fuchs10,
  author       = {Christian Fuchs},
  title        = {Facebook, Web 2.0 und {\"{o}}konomische {\"{U}}berwachung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {453--458},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0128-x},
  doi          = {10.1007/S11623-010-0128-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fuchs10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gelzhauser10,
  author       = {Sven Gelzh{\"{a}}user},
  title        = {Erfolgreiches De-Mail Pilotprojekt: Teilnehmer ziehen Bilanz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {646--648},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0153-9},
  doi          = {10.1007/S11623-010-0153-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gelzhauser10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gietl10,
  author       = {Andreas Gietl},
  title        = {Die zukunft der vorratsdatenspeicherung - Anmerkung zum Urteil des
                  BVerfG vom 2. M{\"{a}}rz 2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {398--403},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0113-4},
  doi          = {10.1007/S11623-010-0113-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gietl10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Goetz10,
  author       = {Christoph F.{-}J. Goetz},
  title        = {eHealth: Welchen Nutzen erwartet der B{\"{u}}rger?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {811--814},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0221-1},
  doi          = {10.1007/S11623-010-0221-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Goetz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GramlichPHT10,
  author       = {Ludwig Gramlich and
                  Thomas Petri and
                  Gerrit Hornung and
                  Marie{-}Theres Tinnefeld},
  title        = {Buchbesprechung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {122--125},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0050-2},
  doi          = {10.1007/S11623-010-0050-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GramlichPHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrevelerW10,
  author       = {Ulrich Greveler and
                  Christoph Wegener},
  title        = {Ein Ansatz zur Umsetzung von L{\"{o}}schvorschriften mittels
                  Verschl{\"{u}}sselung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {467--471},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0131-2},
  doi          = {10.1007/S11623-010-0131-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrevelerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Grimm10,
  author       = {R{\"{u}}diger Grimm},
  title        = {Wissen, was passiert ist},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {71},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0036-0},
  doi          = {10.1007/S11623-010-0036-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Grimm10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GrimmP10,
  author       = {R{\"{u}}diger Grimm and
                  Daniel P{\"{a}}hler},
  title        = {E-Mail-Forensik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {86--89},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0041-3},
  doi          = {10.1007/S11623-010-0041-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GrimmP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Guneysu10,
  author       = {Tim G{\"{u}}neysu},
  title        = {Kryptografie auf programmierbarer Hardware},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {832--837},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0225-x},
  doi          = {10.1007/S11623-010-0225-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Guneysu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HaaseHK10,
  author       = {Martin Sebastian Haase and
                  Thorsten Heermann and
                  Christian Kl{\"{u}}gel},
  title        = {Blutuntersuchungen im Bewerbungsverfahren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {819--823},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0223-z},
  doi          = {10.1007/S11623-010-0223-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HaaseHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HanacekD10,
  author       = {Petr Han{\'{a}}cek and
                  Martin Drahansk{\'{y}}},
  title        = {Analyse sicherer Hardwarel{\"{o}}sungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {766--770},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0208-y},
  doi          = {10.1007/S11623-010-0208-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HanacekD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HansenT10,
  author       = {Marit Hansen and
                  Sven Thomsen},
  title        = {Lebenslanger Datenschutz: Anforderungen an vertrauensw{\"{u}}rdige
                  Infrastrukturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {283--288},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0088-1},
  doi          = {10.1007/S11623-010-0088-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HansenT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeibeyQ10,
  author       = {Hanns{-}Wilhelm Heibey and
                  Gisela Quiring{-}Kock},
  title        = {Biometrische Authentisierung - M{\"{o}}glichkeiten und Grenzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {332--333},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0099-y},
  doi          = {10.1007/S11623-010-0099-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeibeyQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeidrichW10,
  author       = {Joerg Heidrich and
                  Christoph Wegener},
  title        = {Datenschutzrechtliche Aspekte bei der weitergabe von IP-Adressen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {172--177},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0028-0},
  doi          = {10.1007/S11623-010-0028-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeidrichW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeinsonYFWS10,
  author       = {Dennis Heinson and
                  York Yannikos and
                  Frederik Franke and
                  Christian Winter and
                  Markus Schneider},
  title        = {Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen
                  - Methoden zur Aufkl{\"{a}}rung verbotener Handlungen im Spannungsfeld
                  rechtlicher Interessen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {75--79},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0039-x},
  doi          = {10.1007/S11623-010-0039-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeinsonYFWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Helmbrecht10,
  author       = {Udo Helmbrecht},
  title        = {Data protection and legal compliance in cloud computing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {554--556},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0189-x},
  doi          = {10.1007/S11623-010-0189-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Helmbrecht10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hemker10,
  author       = {Thomas Hemker},
  title        = {Kann das jeder? - Ja, eigentlich schon!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {626--629},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0148-6},
  doi          = {10.1007/S11623-010-0148-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hemker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hoeren10,
  author       = {Thomas Hoeren},
  title        = {Das neue {BDSG} und die Auftragsdatenverarbeitung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {688--691},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0167-3},
  doi          = {10.1007/S11623-010-0167-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hoeren10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HoerenV10,
  author       = {Thomas Hoeren and
                  Gottfried Vossen},
  title        = {Die Rolle des Rechts in einer durch das Web 2.0 dominierten Welt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {463--466},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0130-3},
  doi          = {10.1007/S11623-010-0130-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HoerenV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Holtz10,
  author       = {Leif{-}Erik Holtz},
  title        = {Datenschutzkonformes Social Networking: Clique und Scramble!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {439--443},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0125-0},
  doi          = {10.1007/S11623-010-0125-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Holtz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian10,
  author       = {Kai Jendrian},
  title        = {Web-Schutz-Baukasten f{\"{u}}r Firefox - Sicheres Surfen trotz
                  aktiver Inhalte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {48--51},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0012-8},
  doi          = {10.1007/S11623-010-0012-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jendrian10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jendrian10a,
  author       = {Kai Jendrian},
  title        = {{\"{U}}berpr{\"{u}}fung von Webanwendungen mit dem "OWASP
                  Application Security Verification Standard 2009"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {138--142},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0022-6},
  doi          = {10.1007/S11623-010-0022-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jendrian10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/JendrianW10,
  author       = {Kai Jendrian and
                  Christoph Weinmann},
  title        = {Daten und Informationen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {108},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0046-y},
  doi          = {10.1007/S11623-010-0046-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/JendrianW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Junker10,
  author       = {Holger Junker},
  title        = {Sicherheit {\&} {SOA} in der Bundesverwaltung - Sicherheit Service-orientierter
                  Architekturen am Beispiel modernen E-Governments},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {649--651},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0154-8},
  doi          = {10.1007/S11623-010-0154-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Junker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kampffmeyer10,
  author       = {Ulrich Kampffmeyer},
  title        = {E-Mail Compliance - revisionssichere Archivierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {619--625},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0147-7},
  doi          = {10.1007/S11623-010-0147-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kampffmeyer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg10,
  author       = {Moritz Karg},
  title        = {Datenschutzrechtliche Rahmenbedingungen beim Einsatz intelligenter
                  Z{\"{a}}hler},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {365--372},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0108-1},
  doi          = {10.1007/S11623-010-0108-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Karg10a,
  author       = {Moritz Karg},
  title        = {Datenschutz f{\"{u}}r Geodaten - Bedarfs es eines datenschutzrechtlichen
                  Rubikons bei der digitalen Erfassung des {\"{o}}ffentlichen Raumes?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {824--831},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0224-y},
  doi          = {10.1007/S11623-010-0224-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Karg10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KarperM10,
  author       = {Irene Karper and
                  S{\"{o}}nke Maseberg},
  title        = {Zertifikat f{\"{u}}r Datenschutz-Management},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {704--708},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0170-8},
  doi          = {10.1007/S11623-010-0170-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KarperM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kirchberg-LennartzW10,
  author       = {Barbara Kirchberg{-}Lennartz and
                  J{\"{u}}rgen Weber},
  title        = {Ist die IP-Adresse ein personenbezogenes Datum?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {479--481},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0134-z},
  doi          = {10.1007/S11623-010-0134-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kirchberg-LennartzW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kleinert10,
  author       = {Christian Alexander Kleinert},
  title        = {Datenschutzaspekte bei der Abrechnung von Patientendaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {240--245},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0075-6},
  doi          = {10.1007/S11623-010-0075-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kleinert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Klingbeil10,
  author       = {J{\"{o}}rg Klingbeil},
  title        = {79. Datenschutzkonferenz in Stuttgart},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {282},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0087-2},
  doi          = {10.1007/S11623-010-0087-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Klingbeil10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Knopp10,
  author       = {Michael Knopp},
  title        = {WLAN-Haftung - Anmerkung zum Urteil des {BGH} vom 12. Mai 2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {653--655},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0156-6},
  doi          = {10.1007/S11623-010-0156-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Knopp10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Knopp10a,
  author       = {Michael Knopp},
  title        = {Datenschutzherausforderung Webtracking},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {783--786},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0211-3},
  doi          = {10.1007/S11623-010-0211-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Knopp10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koppen10,
  author       = {Hajo K{\"{o}}ppen},
  title        = {Entwicklung der Computer-, IuK- und Internetkriminalit{\"{a}}t
                  im Jahr 2009 - Polizeiliche Kriminalstatistik 2009 verzeichnet erneut
                  Anstieg der Computerkriminalit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {771--772},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0209-x},
  doi          = {10.1007/S11623-010-0209-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koppen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KoyE10,
  author       = {Henrik Koy and
                  Bernhard Esslinger},
  title        = {TeleTrusT European Bridge {CA} - Die European Bridge {CA} als Enabler
                  f{\"{u}}r sichere E-Mail mit {S/MIME} zwischen Unternehmen und
                  Beh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {318--322},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0095-2},
  doi          = {10.1007/S11623-010-0095-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KoyE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LaueS10,
  author       = {Philip Laue and
                  Oliver Stiemerling},
  title        = {Identit{\"{a}}ts- und Zugriffsmanagement f{\"{u}}r Cloud
                  Computing Anwendungen - Technisch-organisatorische Probleme, Rechtliche
                  Risiken und L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {692--697},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0168-2},
  doi          = {10.1007/S11623-010-0168-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LaueS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LepperhoffPT10,
  author       = {Niels Lepperhoff and
                  Bj{\"{o}}rn Petersdorf and
                  Sabine Thursch},
  title        = {Messung des Datenschutz-Vollzugsdefizits},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {716--720},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0173-5},
  doi          = {10.1007/S11623-010-0173-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LepperhoffPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Leutheusser-Schnarrenberger10,
  author       = {Sabine Leutheusser{-}Schnarrenberger},
  title        = {Grundrechtsschutz im Europa des Lissaboner Vertrags - Trends und Perspektiven},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {519--522},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0182-4},
  doi          = {10.1007/S11623-010-0182-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Leutheusser-Schnarrenberger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lindhorst10,
  author       = {Matthias Lindhorst},
  title        = {Wettbewerbsrecht und datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {713--715},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0172-6},
  doi          = {10.1007/S11623-010-0172-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lindhorst10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lipman10,
  author       = {Maria Lipman},
  title        = {Russia's Media: Freedom of expression, but no press freedom},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {529--534},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0184-2},
  doi          = {10.1007/S11623-010-0184-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lipman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lipner10,
  author       = {Steve Lipner},
  title        = {Security development lifecycle - Security considerations for client
                  and cloud Applications},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {135--137},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0021-7},
  doi          = {10.1007/S11623-010-0021-7},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lipner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MainuschB10,
  author       = {Johannes Mainusch and
                  Christian Burtchen},
  title        = {Kontrolle {\"{u}}ber eigene Daten in sozialen Netzwerken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {448--452},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0127-y},
  doi          = {10.1007/S11623-010-0127-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MainuschB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Makulilo10,
  author       = {Alex B. Makulilo},
  title        = {'You must take medical test' - Do employers Intrude into Prospective
                  Employees' Privacy?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {571--575},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0193-1},
  doi          = {10.1007/S11623-010-0193-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Makulilo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/McGinley10,
  author       = {Marie McGinley},
  title        = {Die Verarbeitung von Fluggastdaten f{\"{u}}r Strafverfolgungszwecke
                  - Das geplante {EU} {PNR} System},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {250--253},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0077-4},
  doi          = {10.1007/S11623-010-0077-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/McGinley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mertes10,
  author       = {Paul E. Mertes},
  title        = {E-Mails im Rechtsverkehr: keine Lappalie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {633--637},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0150-z},
  doi          = {10.1007/S11623-010-0150-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mertes10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester10,
  author       = {Britta Alexandra Mester},
  title        = {Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {203},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0065-8},
  doi          = {10.1007/S11623-010-0065-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester10a,
  author       = {Britta Alexandra Mester},
  title        = {Rechnen in der Wolke},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {675},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0163-7},
  doi          = {10.1007/S11623-010-0163-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Meyerholt10,
  author       = {Ulrich Meyerholt},
  title        = {Das Bundesverfassungsgericht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {721},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0174-4},
  doi          = {10.1007/S11623-010-0174-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Meyerholt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muglich10,
  author       = {Andreas M{\"{u}}glich},
  title        = {Wanckel, Endress: foto- und Bildrecht, 3. Aufl. - M{\"{u}}nchen
                  2009, S.398, {ISBN} 978-3-406-58102-1},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {350},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0119-y},
  doi          = {10.1007/S11623-010-0119-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muglich10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muglich10a,
  author       = {Andreas M{\"{u}}glich},
  title        = {Marly, Jochen: Praxishandbuch Softwarerecht - Rechtsschutz und Vertragsgestaltung
                  - 5. Aufl. M{\"{u}}nchen 2009, S.1104, {ISBN} 978-3-406-59222-5,
                  128 Euro},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {430},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0118-z},
  doi          = {10.1007/S11623-010-0118-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muglich10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muller10,
  author       = {Klaus J. M{\"{u}}ller},
  title        = {Gewinnung von Verhaltensprofilen am intelligenten Stromz{\"{a}}hler},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {359--364},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0107-2},
  doi          = {10.1007/S11623-010-0107-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muller10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Naumann10,
  author       = {Tino Naumann},
  title        = {S{\"{a}}chsischer Datenschutzbeauftragter unterst{\"{u}}tzt
                  die Datenschutzbeh{\"{o}}rde von Bosnien-Herzegowina},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {6},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0003-9},
  doi          = {10.1007/S11623-010-0003-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Naumann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/NohlT10,
  author       = {Karsten Nohl and
                  Erik Tews},
  title        = {Kann man mit {DECT} noch vertraulich telefonieren?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {758--760},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0206-0},
  doi          = {10.1007/S11623-010-0206-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/NohlT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ozbek10,
  author       = {Hakan {\"{O}}zbek},
  title        = {Datenschutz konformer Einsatz von E-Discovery Systemen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {576--580},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0194-0},
  doi          = {10.1007/S11623-010-0194-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ozbek10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ozdemir10,
  author       = {Hayrunnisa {\"{O}}zdemir},
  title        = {Der Schutz personenbezogener Daten in der T{\"{u}}rkei},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {566--570},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0192-2},
  doi          = {10.1007/S11623-010-0192-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ozdemir10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri10,
  author       = {Thomas Petri},
  title        = {Wertewandel im Datenschutz und die Grundrechte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {25--29},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0007-5},
  doi          = {10.1007/S11623-010-0007-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri10a,
  author       = {Thomas Petri},
  title        = {Sicherheit und Selbstbestimmung - - deutsche und europ{\"{a}}ische
                  Diskurse zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {539--543},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0186-0},
  doi          = {10.1007/S11623-010-0186-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetriS10,
  author       = {Thomas Petri and
                  Peter Schaar},
  title        = {Aus Den Datenschutzbeh{\"{o}}rden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {206},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0067-6},
  doi          = {10.1007/S11623-010-0067-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PetriS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann10,
  author       = {Norbert Pohlmann},
  title        = {Bedrohungen und Herausforderungen des E-Mail-Dienstes - Die Sicherheitsrisiken
                  des E-Mail-Dienstes im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {607--613},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0145-9},
  doi          = {10.1007/S11623-010-0145-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pohlmann10a,
  author       = {Norbert Pohlmann},
  title        = {Wie zuverl{\"{a}}ssig ist die E-Mail-Anwendung?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {656},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0157-5},
  doi          = {10.1007/S11623-010-0157-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pohlmann10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PohlmannR10,
  author       = {Norbert Pohlmann and
                  Helmut Reimer},
  title        = {E-Mail Compliance - Wunsch und Wirklichkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {603},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0142-z},
  doi          = {10.1007/S11623-010-0142-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PohlmannR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PolenzT10,
  author       = {Sven Polenz and
                  Sven Thomsen},
  title        = {Internet- und E-Mail-Nutzung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {614--618},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0146-8},
  doi          = {10.1007/S11623-010-0146-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PolenzT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Poschmann10,
  author       = {Axel Poschmann},
  title        = {Lightweight Blockchiffren - Verschl{\"{u}}sselung fast ohne Energie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {747--752},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0204-2},
  doi          = {10.1007/S11623-010-0204-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Poschmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock10,
  author       = {Gisela Quiring{-}Kock},
  title        = {Zertifizierungen und ihre Bedeutung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {178--181},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0029-z},
  doi          = {10.1007/S11623-010-0029-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Raabe10,
  author       = {Oliver Raabe},
  title        = {Datenschutz im Smartgrid - Anpassungsbedarf des Rechts und des Systemdatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {379--386},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0110-7},
  doi          = {10.1007/S11623-010-0110-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Raabe10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RassS10,
  author       = {Stefan Rass and
                  Peter Schartner},
  title        = {Quantenkryptographie - {\"{U}}berblick und aktuelle Entwicklungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {753--757},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0205-1},
  doi          = {10.1007/S11623-010-0205-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/RassS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer10,
  author       = {Helmut Reimer},
  title        = {20. SIT-SmartCard-Workshop, 2.-3.02.2010 in Darmstadt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {272--273},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0082-7},
  doi          = {10.1007/S11623-010-0082-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer10a,
  author       = {Helmut Reimer},
  title        = {Veranstaltungsbesprechung - 19. {RSA} Conference, 01. - 05.03.2010
                  in San francisco, {USA}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {348--350},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0103-6},
  doi          = {10.1007/S11623-010-0103-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer10b,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {422--430},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0117-0},
  doi          = {10.1007/S11623-010-0117-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerR10,
  author       = {Helmut Reimer and
                  Karl Rihaczek},
  title        = {Zur Erinnerung an Eckart Raubold},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {808},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0218-9},
  doi          = {10.1007/S11623-010-0218-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reiners10,
  author       = {Wilfried Reiners},
  title        = {E-Mail Compliance fordert E-Mail Richtlinie - Der Umgang mit E-Mails
                  zwischen Datensicherheit und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {630--632},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0149-5},
  doi          = {10.1007/S11623-010-0149-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reiners10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10,
  author       = {Karl Rihaczek},
  title        = {Stolz, Gl{\"{u}}ck, Unvernunft},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {5},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0002-x},
  doi          = {10.1007/S11623-010-0002-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10a,
  author       = {Karl Rihaczek},
  title        = {Der Stein von Rosette},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {73},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0037-z},
  doi          = {10.1007/S11623-010-0037-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10b,
  author       = {Karl Rihaczek},
  title        = {33 {DAFTA} Datenschutzfachtagung der {GDD} Gesellschaft f{\"{u}}r
                  Datenschutz und Datensicherung am 19/20.11.2008 im Maternushaus, K{\"{o}}ln},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {121--122},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0049-8},
  doi          = {10.1007/S11623-010-0049-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10c,
  author       = {Karl Rihaczek},
  title        = {Daten und Information},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {133},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0019-1},
  doi          = {10.1007/S11623-010-0019-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10d,
  author       = {Karl Rihaczek},
  title        = {Informatik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {205},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0066-7},
  doi          = {10.1007/S11623-010-0066-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10e,
  author       = {Karl Rihaczek},
  title        = {Falsch verortet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {281},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0086-3},
  doi          = {10.1007/S11623-010-0086-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10f,
  author       = {Karl Rihaczek},
  title        = {Ziel oder Ende},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {357},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0105-4},
  doi          = {10.1007/S11623-010-0105-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10g,
  author       = {Karl Rihaczek},
  title        = {Die Datenschutzerkl{\"{a}}rung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {437},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0123-2},
  doi          = {10.1007/S11623-010-0123-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10h,
  author       = {Karl Rihaczek},
  title        = {Anders gekommen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {517},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0180-6},
  doi          = {10.1007/S11623-010-0180-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10i,
  author       = {Karl Rihaczek},
  title        = {Wikipedia},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {9},
  pages        = {605},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0143-y},
  doi          = {10.1007/S11623-010-0143-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10j,
  author       = {Karl Rihaczek},
  title        = {ElENA},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {677},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0164-6},
  doi          = {10.1007/S11623-010-0164-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10k,
  author       = {Karl Rihaczek},
  title        = {Ethischer Fortschritt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {11},
  pages        = {745},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0202-4},
  doi          = {10.1007/S11623-010-0202-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek10l,
  author       = {Karl Rihaczek},
  title        = {Street View},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {809},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0219-8},
  doi          = {10.1007/S11623-010-0219-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek10l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rogowicz10,
  author       = {Eva Rogowicz},
  title        = {Die entwicklung der europ{\"{a}}ischen asyl- und Fl{\"{u}}chtlingspolitik
                  und ihre datenschutzrechtlichen Rahmenbedingungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {562--565},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0191-3},
  doi          = {10.1007/S11623-010-0191-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rogowicz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ronellenfitsch10,
  author       = {Michael Ronellenfitsch},
  title        = {Rechtsgutachten zur Neugestaltung der Datenschutzkontrolle in Hessen
                  - Beitrag zur Kl{\"{a}}rung der Konsequenzen aus dem Urteil des
                  EuGH vom 9. M{\"{a}}rz 2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {438},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0124-1},
  doi          = {10.1007/S11623-010-0124-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ronellenfitsch10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rossnagel10,
  author       = {Alexander Ro{\ss}nagel},
  title        = {Das Bundesverfassungsgericht und die Vorratsdatenspeicherung in Europa},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {544--548},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0187-z},
  doi          = {10.1007/S11623-010-0187-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rossnagel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelJ10,
  author       = {Alexander Ro{\ss}nagel and
                  Silke Jandt},
  title        = {Datenschutzkonformes Energieinformationsnetz - Risiken und Gestaltungsvorschl{\"{a}}ge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {373--378},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0109-0},
  doi          = {10.1007/S11623-010-0109-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ruggieri10,
  author       = {Franco Ruggieri},
  title        = {Registered e-mail {(REM)} - Reliable e-mail for everybody},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {314--317},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0094-3},
  doi          = {10.1007/S11623-010-0094-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ruggieri10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Saeltzer10,
  author       = {Gerhard Saeltzer},
  title        = {Little Brothers are watching you - Geheime Verbrauchserfassung in
                  Wohnungen per Funk und andere {\"{u}}ble {\"{U}}berraschungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {387--389},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0111-6},
  doi          = {10.1007/S11623-010-0111-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Saeltzer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schaar10,
  author       = {Peter Schaar},
  title        = {Ein Datenschutzrecht f{\"{u}}r das 21. Jahrhundert},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {518},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0181-5},
  doi          = {10.1007/S11623-010-0181-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schaar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer10,
  author       = {Burkhard Schafer},
  title        = {The {UK} Cleanfeed system - Lessons for the German debate?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {535--538},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0185-1},
  doi          = {10.1007/S11623-010-0185-1},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schafer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schild10,
  author       = {Hans{-}Hermann Schild},
  title        = {Die v{\"{o}}llige Unabh{\"{a}}ngigkeit der Aufsichtsbeh{\"{o}}rden
                  aus europarechtlicher Sicht - - zugleich {\"{U}}berlegungen,
                  die bestehende Vertragsverletzung im Bereich der Kontrollbeh{\"{o}}rden
                  nach Art.28 EG-DS-RiLi der Bundesrepublik Deutschland endlich zu beenden},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {549--553},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0188-y},
  doi          = {10.1007/S11623-010-0188-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schild10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmidlK10,
  author       = {Michael Schmidl and
                  Daniel Krone},
  title        = {Standardvertragsklauseln als Basis intra-europ{\"{a}}ischer Auftragsdatenverarbeitung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {838--843},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0226-9},
  doi          = {10.1007/S11623-010-0226-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchmidlK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schmidt10,
  author       = {Bernd Schmidt},
  title        = {Besch{\"{a}}ftigtendatenschutz in {\textsection} 32 {BDSG} -
                  Perspektiven einer vorl{\"{a}}ufigen Regelung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {207--212},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0068-5},
  doi          = {10.1007/S11623-010-0068-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schmidt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schroder10,
  author       = {Nils Schr{\"{o}}der},
  title        = {Privatsph{\"{a}}re mit System},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {74},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0038-y},
  doi          = {10.1007/S11623-010-0038-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schroder10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz10,
  author       = {S{\"{o}}nke E. Schulz},
  title        = {Informations- und Kommunikationstechnologie als Grundversorgung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {698--702},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0169-1},
  doi          = {10.1007/S11623-010-0169-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schumacher10,
  author       = {Astrid Schumacher},
  title        = {Akkreditierung und Zertifizierung von De-Mail-Diensteanbietern - Eine
                  {\"{U}}bersicht {\"{u}}ber die technischen Vorgaben zur
                  Gew{\"{a}}hrleistung der sicheren Kommunikationsinfrastruktur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {302--307},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0092-5},
  doi          = {10.1007/S11623-010-0092-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schumacher10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schumann10,
  author       = {David Schumann},
  title        = {Anonymit{\"{a}}t bewahrendes Data Mining},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {709--712},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0171-7},
  doi          = {10.1007/S11623-010-0171-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schumann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seeger10,
  author       = {Mark M. Seeger},
  title        = {Three years hacker paragraph - {A} review},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {476--478},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0133-0},
  doi          = {10.1007/S11623-010-0133-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seeger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Siman10,
  author       = {Maty Siman},
  title        = {Platform for application risk intelligence - Using source code understanding
                  as a risk barometer},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {143--148},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0023-5},
  doi          = {10.1007/S11623-010-0023-5},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Siman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Sowa10,
  author       = {Aleksandra Sowa},
  title        = {IT-relevante Aspekte einer Pr{\"{u}}fung von Datenschutz-Compliance},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {104--107},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0045-z},
  doi          = {10.1007/S11623-010-0045-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Sowa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Starosta10,
  author       = {Justyna Starosta},
  title        = {Transnationaler Datenaustausch zur Terrorismusbek{\"{a}}mpfung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {236--239},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0074-7},
  doi          = {10.1007/S11623-010-0074-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Starosta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/StopferBE10,
  author       = {Juliane M. Stopfer and
                  Mitja D. Back and
                  Boris Egloff},
  title        = {Pers{\"{o}}nlichkeit 2.0 - Genauigkeit von Pers{\"{o}}nlichkeitsurteilen
                  anhand von Online Social Network-Profilen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {459--462},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0129-9},
  doi          = {10.1007/S11623-010-0129-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/StopferBE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Strauss10,
  author       = {Stefan Strau{\ss}},
  title        = {Datenschutzimplikationen staatlicher Identit{\"{a}}tsmanagement-Systeme
                  - Fallbeispiel {\"{O}}sterreich},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {99--103},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0044-0},
  doi          = {10.1007/S11623-010-0044-0},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Strauss10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Taeger10,
  author       = {J{\"{u}}rgen Taeger},
  title        = {Informationspflicht {\"{u}}ber den datenschutz im M-commerce},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {246--249},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0076-5},
  doi          = {10.1007/S11623-010-0076-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Taeger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Thiel10,
  author       = {Christoph Thiel},
  title        = {Business Continuity Management f{\"{u}}r {KMU}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {6},
  pages        = {404--407},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0114-3},
  doi          = {10.1007/S11623-010-0114-3},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Thiel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld10,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Stopp-Schilder im Internet - Beunruhigende Fragen im Kampf gegen Kinderpornografie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {15--19},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0005-7},
  doi          = {10.1007/S11623-010-0005-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB10,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Datenschutz international},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {515},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0179-z},
  doi          = {10.1007/S11623-010-0179-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB10a,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {V{\"{o}}llige unabh{\"{a}}ngigkeit der datenschutzkontrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {581--582},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0195-z},
  doi          = {10.1007/S11623-010-0195-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldGJ10,
  author       = {Marie{-}Theres Tinnefeld and
                  Ludwig Gramlich and
                  Kai Jendrian},
  title        = {Buchbesprechung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {508--510},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0140-1},
  doi          = {10.1007/S11623-010-0140-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldS10,
  author       = {Marie{-}Theres Tinnefeld and
                  Wolfgang Schmale},
  title        = {Identit{\"{a}}t durch Grundrechte},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {523--528},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0183-3},
  doi          = {10.1007/S11623-010-0183-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Volker10,
  author       = {J{\"{o}}rg V{\"{o}}lker},
  title        = {iPhone Security},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {486--491},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0136-x},
  doi          = {10.1007/S11623-010-0136-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Volker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterM10,
  author       = {Michael W{\"{a}}chter and
                  Andreas M{\"{u}}glich},
  title        = {Buchbesprechung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {273--274},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0083-6},
  doi          = {10.1007/S11623-010-0083-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WachterM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner10,
  author       = {Edgar Wagner},
  title        = {Datenschutz bei Kundenkarten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {30--33},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0008-4},
  doi          = {10.1007/S11623-010-0008-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner10a,
  author       = {Edgar Wagner},
  title        = {Datenschutz als Bildungsaufgabe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {8},
  pages        = {557--561},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0190-4},
  doi          = {10.1007/S11623-010-0190-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Warga10,
  author       = {Norbert Warga},
  title        = {Das Elena-Konzept},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {216--220},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0070-y},
  doi          = {10.1007/S11623-010-0070-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Warga10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener10,
  author       = {Christoph Wegener},
  title        = {Vertrauensgrundlagen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {279},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0085-4},
  doi          = {10.1007/S11623-010-0085-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener10a,
  author       = {Christoph Wegener},
  title        = {Was schafft eigentlich Vertrauensw{\"{u}}rdigkeit?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {334},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0100-9},
  doi          = {10.1007/S11623-010-0100-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert10,
  author       = {Thilo Weichert},
  title        = {Dauerbrenner BDSG-Novellierung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {1},
  pages        = {7--14},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0004-8},
  doi          = {10.1007/S11623-010-0004-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert10a,
  author       = {Thilo Weichert},
  title        = {Cloud Computing und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {10},
  pages        = {679--687},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0166-4},
  doi          = {10.1007/S11623-010-0166-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert10b,
  author       = {Thilo Weichert},
  title        = {Regulierung personenbezogener Internet-Ver{\"{o}}ffentlichungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {12},
  pages        = {810},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0220-2},
  doi          = {10.1007/S11623-010-0220-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weiss10,
  author       = {Stefan Weiss},
  title        = {Datenschutz Compliance in Sozialen Netzwerk anwendungen - Voraussetzungen
                  f{\"{u}}r die technische Umsetzbarkeit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {7},
  pages        = {444--447},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0126-z},
  doi          = {10.1007/S11623-010-0126-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weiss10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wiele10,
  author       = {Johannes Wiele},
  title        = {Gesetze als Vorbild f{\"{u}}r Security Policies},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {166--171},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0027-1},
  doi          = {10.1007/S11623-010-0027-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wiele10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wrede10,
  author       = {Ann{-}Karina Wrede},
  title        = {Rechtliche Einordnung von Webcams},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {225--228},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0072-9},
  doi          = {10.1007/S11623-010-0072-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wrede10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WysopalES10,
  author       = {Chris Wysopal and
                  Chris Eng and
                  Tyler Shields},
  title        = {Static detection of application backdoors - Detecting both malicious
                  software behavior and malicious indicators from the static analysis
                  of executable code},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {149--155},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0024-4},
  doi          = {10.1007/S11623-010-0024-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WysopalES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X10,
  title        = {Arbeitskreis "Datenschutz in Recht und Praxis" im BvD e. {V.:} Eine
                  Frage der Erforderlichkeit - Zwischenruf von Praktikern zum {\textsection}
                  32 {BDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {254--256},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0078-3},
  doi          = {10.1007/S11623-010-0078-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/YannikosWFS10,
  author       = {York Yannikos and
                  Christian Winter and
                  Frederik Franke and
                  Markus Schneider},
  title        = {Erzeugung synthetischer Daten zum Test IT-forensischer Werkzeuge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {90--95},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0042-2},
  doi          = {10.1007/S11623-010-0042-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/YannikosWFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZikeschR10,
  author       = {Philipp Zikesch and
                  Bernd Reimer},
  title        = {Datenschutz und pr{\"{a}}ventive Korruptionsbek{\"{a}}mpfung
                  - kein Zielkonflikt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {2},
  pages        = {96--98},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0043-1},
  doi          = {10.1007/S11623-010-0043-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ZikeschR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zilkens10,
  author       = {Martin Zilkens},
  title        = {Datenschutz im Ausl{\"{a}}nderwesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {4},
  pages        = {229--235},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0073-8},
  doi          = {10.1007/S11623-010-0073-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zilkens10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics