Search dblp for Publications

export results for "toc:db/journals/dud/dud35.bht:"

 download as .bib file

@article{DBLP:journals/dud/Abate11,
  author       = {Constantin Abate},
  title        = {Online-durchsuchung, Quellentelekommunikations{\"{u}}berwachung
                  und die t{\"{u}}cke im detail - Einfluss rechtlicher und technischer
                  Entwicklungen auf verdeckte Online-Ermittlungen zur gew{\"{a}}hrleistung
                  der inneren sicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {122--125},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0031-0},
  doi          = {10.1007/S11623-011-0031-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Abate11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Abate11a,
  author       = {Constantin Abate},
  title        = {Pr{\"{a}}ventive und repressive Video{\"{u}}berwachung {\"{o}}ffentlicher
                  Pl{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {451--454},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0113-z},
  doi          = {10.1007/S11623-011-0113-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Abate11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Alsbih11,
  author       = {Amir Alsbih},
  title        = {Der reale Wert einer IP-Adresse},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {482--488},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0119-6},
  doi          = {10.1007/S11623-011-0119-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Alsbih11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Asaj11,
  author       = {Naim Asaj},
  title        = {Datenschutz im Fahrzeug - {\"{U}}bersicht, Aspekte und erste
                  L{\"{o}}sungsans{\"{a}}tze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {558--564},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0137-4},
  doi          = {10.1007/S11623-011-0137-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Asaj11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Baum11,
  author       = {Gerhart R. Baum},
  title        = {Unerledigte Verfassungsauftr{\"{a}}ge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {595--597},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0145-4},
  doi          = {10.1007/S11623-011-0145-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Baum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bausewein11,
  author       = {Christoph Bausewein},
  title        = {Der sachliche Anwendungsbereich des {BDSG} im Besch{\"{a}}ftigtendatenschutz
                  - Reichweite des {\textsection} 32 Absatz 2 {BDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {94--97},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0027-9},
  doi          = {10.1007/S11623-011-0027-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bausewein11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BeisenherzT11,
  author       = {Gerhard Beisenherz and
                  Marie{-}Theres Tinnefeld},
  title        = {Aspekte der Einwilligung - Zivil- und strafrechtliche Bez{\"{u}}ge
                  der Einwilligung im Datenschutzrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {110--115},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0029-7},
  doi          = {10.1007/S11623-011-0029-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BeisenherzT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Bienert11,
  author       = {Jens Bienert},
  title        = {Mikrozensus},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {732},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0174-z},
  doi          = {10.1007/S11623-011-0174-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Bienert11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Biewald11,
  author       = {Marco Biewald},
  title        = {Externe Dienstleister im Krankenhaus und {\"{a}}rztliche Schweigepflicht
                  - eine rechtliche Unsicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {867--869},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0203-y},
  doi          = {10.1007/S11623-011-0203-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Biewald11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BirkHW11,
  author       = {Dominik Birk and
                  Dennis Heinson and
                  Christoph Wegener},
  title        = {Virtuelle Spurensuche - Digitale Forensik in Cloud-Umgebungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {329--332},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0080-4},
  doi          = {10.1007/S11623-011-0080-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BirkHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BirkholzESS11,
  author       = {Henk Birkholz and
                  Carsten Elfers and
                  Bernd Samjeske and
                  Karsten Sohr},
  title        = {Unternehmens{\"{u}}bergreifender Austausch von sicherheitsrelevantem
                  Wissen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {258--261},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0063-5},
  doi          = {10.1007/S11623-011-0063-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BirkholzESS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BraunlichRGR11,
  author       = {Katharina Br{\"{a}}unlich and
                  Philipp Richter and
                  R{\"{u}}diger Grimm and
                  Alexander Ro{\ss}nagel},
  title        = {Verbindung von CC-Schutzprofilen mit der Methode rechtlicher IT-Gestaltung
                  {KORA} - Anwendungsbeispiel: Wahlgeheimnis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {129--135},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0033-y},
  doi          = {10.1007/S11623-011-0033-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BraunlichRGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BrunnerSHRT11,
  author       = {Martin Brunner and
                  Peter Schoo and
                  Hans Hofinger and
                  Christopher Roblee and
                  Sascha Todt},
  title        = {Forschungsans{\"{a}}tze zur Effizienzsteigerung heutiger IT-Fr{\"{u}}hwarnsysteme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {253--257},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0062-6},
  doi          = {10.1007/S11623-011-0062-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/BrunnerSHRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Brunst11,
  author       = {Phillip W. Brunst},
  title        = {Staatlicher Zugang zur digitalen Identit{\"{a}}t - Erosion der
                  Anonymit{\"{a}}t im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {618--623},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0150-7},
  doi          = {10.1007/S11623-011-0150-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Brunst11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner11,
  author       = {Benedikt Buchner},
  title        = {DuD Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {658--665},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0159-y},
  doi          = {10.1007/S11623-011-0159-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner11a,
  author       = {Benedikt Buchner},
  title        = {Health 2.0},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {837},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0196-6},
  doi          = {10.1007/S11623-011-0196-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Buchner11b,
  author       = {Benedikt Buchner},
  title        = {Recht auf Akteneinsicht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {896},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0210-z},
  doi          = {10.1007/S11623-011-0210-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Buchner11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Busch11,
  author       = {Christoph Busch},
  title        = {Datensicherheit unerw{\"{u}}nscht?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {210},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0051-9},
  doi          = {10.1007/S11623-011-0051-9},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/Busch11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/BuschKABFFMNNOOSWWXZ11,
  author       = {Christoph Busch and
                  Ulrike Korte and
                  Sebastian Abt and
                  Christian B{\"{o}}hm and
                  Ines F{\"{a}}rber and
                  Sergej Fries and
                  Johannes Merkle and
                  Claudia Nickel and
                  Alexander Nouak and
                  Alexander Opel and
                  Annahita Oswald and
                  Thomas Seidl and
                  Bianca Wackersreuther and
                  Peter Wackersreuther and
                  Xuebing Zhou},
  title        = {Biometric Template Protection - Ein Bericht {\"{u}}ber das Projekt
                  BioKeyS},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {183--191},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0047-5},
  doi          = {10.1007/S11623-011-0047-5},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/BuschKABFFMNNOOSWWXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Caspar11,
  author       = {Johannes Caspar},
  title        = {Arbeitnehmerdatenschutz - Im Spannungsfeld zwischen informationeller
                  Selbstbestimmung und betrieblicher Kontrolle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {687--693},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0165-0},
  doi          = {10.1007/S11623-011-0165-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Caspar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Damm11,
  author       = {Reinhard Damm},
  title        = {Pr{\"{a}}diktive Gesundheitsinformationen in der modernen Medizin},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {859--866},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0202-z},
  doi          = {10.1007/S11623-011-0202-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Damm11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Daubler-Gmelin11,
  author       = {Herta D{\"{a}}ubler{-}Gmelin},
  title        = {{AEO} - Zertifizierung, Terrorlisten und Mitarbeiterscreening},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {455--459},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0114-y},
  doi          = {10.1007/S11623-011-0114-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Daubler-Gmelin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Doesinger11,
  author       = {Stephan Doesinger},
  title        = {Medienf{\"{u}}hrerschein, wozu?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {648--649},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0156-1},
  doi          = {10.1007/S11623-011-0156-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Doesinger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Dotzler11,
  author       = {Florian Dotzler},
  title        = {Eine datenschutzrechtlich motivierte Untersuchung Tippverhalten basierender
                  Authentifizierungssysteme - Darstellung am Beispiel textgebundener
                  L{\"{o}}sungen zur Benutzererkennung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {192--196},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0048-4},
  doi          = {10.1007/S11623-011-0048-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Dotzler11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DrahanskyDV11,
  author       = {Martin Drahansk{\'{y}} and
                  Radim Dvorak and
                  Jan Vana},
  title        = {Personenerkennung mittels 3D Handgeometrie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {169--173},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0044-8},
  doi          = {10.1007/S11623-011-0044-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/DrahanskyDV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Ebeling11,
  author       = {Michael Ebeling},
  title        = {Die Untiefen des Zensus 2011 - Kritik an der Volksz{\"{a}}hlung
                  2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {721--725},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0172-1},
  doi          = {10.1007/S11623-011-0172-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Ebeling11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EckertK11,
  author       = {Claudia Eckert and
                  Christoph Krau{\ss}},
  title        = {Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {535--541},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0133-8},
  doi          = {10.1007/S11623-011-0133-8},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/EckertK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EichlerW11,
  author       = {Carolyn Eichler and
                  Thilo Weichert},
  title        = {EC-Kartennutzung, elektronisches Lastschriftverfahren und Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {201--209},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0050-x},
  doi          = {10.1007/S11623-011-0050-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EichlerW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/EngelberthFGGHHTW11,
  author       = {Markus Engelberth and
                  Felix C. Freiling and
                  Jan G{\"{o}}bel and
                  Christian Gorecki and
                  Thorsten Holz and
                  Ralf Hund and
                  Philipp Trinius and
                  Carsten Willems},
  title        = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen
                  Sammlung und Analyse von Schadsoftware im Internet},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {247--252},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0061-7},
  doi          = {10.1007/S11623-011-0061-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Erd11,
  author       = {Rainer Erd},
  title        = {Auftragsdatenverarbeitung in sicheren Drittstaaten - Pl{\"{a}}doyer
                  f{\"{u}}r eine Reform von {\textsection} 3 Absatz 8 Satz 3 {BDSG}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {275--278},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0067-1},
  doi          = {10.1007/S11623-011-0067-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Erd11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Erkeling11,
  author       = {Sabrina Erkeling},
  title        = {Datenschutz in Online-spielen und anderen Virtuellen Welten - Die
                  Verkn{\"{u}}pfung der realen identit{\"{a}}t mit der Virtuellen
                  Welt},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {116--121},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0030-1},
  doi          = {10.1007/S11623-011-0030-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Erkeling11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FederrathFHMSW11,
  author       = {Hannes Federrath and
                  Karl{-}Peter Fuchs and
                  Dominik Herrmann and
                  Daniel Maier and
                  Florian Scheuer and
                  Kai Wagner},
  title        = {Grenzen des "digitalen Radiergummis"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {403--407},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0099-6},
  doi          = {10.1007/S11623-011-0099-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FederrathFHMSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FederrathGH11,
  author       = {Hannes Federrath and
                  Christoph Gerber and
                  Dominik Herrmann},
  title        = {Verhaltensbasierte Verkettung von Internetsitzungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {791--796},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0187-7},
  doi          = {10.1007/S11623-011-0187-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FederrathGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FernandezH11,
  author       = {Manuel J. Calvo Fernandez and
                  Daniela Heinemann},
  title        = {Datenschutz beim Einsatz von Leiharbeitnehmern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {711--714},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0169-9},
  doi          = {10.1007/S11623-011-0169-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FernandezH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FiedlerT11,
  author       = {Arno Fiedler and
                  Christoph Thiel},
  title        = {Signaturstandardisierung: Selbstzweck oder Notwendigkeit? - Die Langzeitvalidierung
                  von PDF-Dokumenten als gutes Beispiel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {36--40},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0010-5},
  doi          = {10.1007/S11623-011-0010-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FiedlerT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox11,
  author       = {Dirk Fox},
  title        = {Betriebswirtschaftliche Bewertung von Security Investments in der
                  Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {50--55},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0014-1},
  doi          = {10.1007/S11623-011-0014-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox11a,
  author       = {Dirk Fox},
  title        = {Datenschutzaufreger},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {383},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0093-z},
  doi          = {10.1007/S11623-011-0093-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox11b,
  author       = {Dirk Fox},
  title        = {Perimetersicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {421},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0103-1},
  doi          = {10.1007/S11623-011-0103-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fox11c,
  author       = {Dirk Fox},
  title        = {Schutzprofile - Protection Profiles},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {570},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0139-2},
  doi          = {10.1007/S11623-011-0139-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fox11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FoxM11,
  author       = {Dirk Fox and
                  Klaus J. M{\"{u}}ller},
  title        = {Viele Daten um Nichts},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {515--516},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0127-6},
  doi          = {10.1007/S11623-011-0127-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FoxM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FoxS11,
  author       = {Dirk Fox and
                  Peter Schartner},
  title        = {Geheimschriften in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {753},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0178-8},
  doi          = {10.1007/S11623-011-0178-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FoxS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FraenkelH11,
  author       = {Reinhard Fraenkel and
                  Volker Hammer},
  title        = {Vom Staats- zum Verfassungstrojaner},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {887--889},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0208-6},
  doi          = {10.1007/S11623-011-0208-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FraenkelH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/FreundM11,
  author       = {Bernhard Freund and
                  Andreas M{\"{u}}glich},
  title        = {Buchbesprechungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {301--302},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0072-4},
  doi          = {10.1007/S11623-011-0072-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/FreundM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy11,
  author       = {Walter Fumy},
  title        = {Standards bringen vielf{\"{a}}ltig Nutzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {3},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0001-6},
  doi          = {10.1007/S11623-011-0001-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Fumy11a,
  author       = {Walter Fumy},
  title        = {Maschinenlesbare Reisedokumente},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {16--21},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0006-1},
  doi          = {10.1007/S11623-011-0006-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Fumy11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gaulke11,
  author       = {Markus Gaulke},
  title        = {Pr{\"{u}}fung der Einhaltung der technischen und organisatorischen
                  Ma{\ss}nahmen bei Auftragsdatenverarbeitungen - Bescheinigung des
                  datenschutzrelevanten Kontrollsystems nach Pr{\"{u}}fungsstandard
                  {ISAE} 3000},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {417--420},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0102-2},
  doi          = {10.1007/S11623-011-0102-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gaulke11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Gaycken11,
  author       = {Sandro Gaycken},
  title        = {Informationelle Selbstbestimmung und narrativistische Rezeption -
                  Zur Konstruktion informationellen Vertrauens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {346--350},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0084-0},
  doi          = {10.1007/S11623-011-0084-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Gaycken11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GerstnerGH11,
  author       = {Markus Gerstner and
                  Georg Gomm and
                  Christian Hansen},
  title        = {Erh{\"{o}}hte Sicherheit durch De-Perimetrisierung - Mehrwert
                  durch Einsatz des Jericho-Konzeptes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {398--402},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0098-7},
  doi          = {10.1007/S11623-011-0098-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GerstnerGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/GiebichensteinW11,
  author       = {R{\"{u}}diger Giebichenstein and
                  Andreas Weiss},
  title        = {Zertifizierte Cloud durch das EuroCloud Star Audit SaaS - Ein Best
                  Practice-Ansatz zur Auswahl eines vertrauensw{\"{u}}rdigen Cloud-Anbieters},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {338--342},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0082-2},
  doi          = {10.1007/S11623-011-0082-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/GiebichensteinW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Goetz11,
  author       = {Christoph F.{-}J. Goetz},
  title        = {Gesundheitstelematik zwischen konventioneller Wahrnehmung und neuen
                  Herausforderungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {847--852},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0200-1},
  doi          = {10.1007/S11623-011-0200-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Goetz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HaaseHR11,
  author       = {Martin Sebastian Haase and
                  Thorsten Heermann and
                  Wolfgang Rottwinkel},
  title        = {Der neue Besch{\"{a}}ftigtendatenschutz im Bewerbungs- und Einstellungsverfahren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {83--87},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0024-z},
  doi          = {10.1007/S11623-011-0024-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HaaseHR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HammerF11,
  author       = {Volker Hammer and
                  Reinhard Fraenkel},
  title        = {L{\"{o}}schklassen - Standardisierte Fristen f{\"{u}}r die
                  L{\"{o}}schung personenbezogener Daten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {890--895},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0209-5},
  doi          = {10.1007/S11623-011-0209-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HammerF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hansen11,
  author       = {Marit Hansen},
  title        = {Optimierte Verantwortung/slosigkeit - Bericht {\"{u}}ber die
                  Sommerakademie 2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {840},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0198-4},
  doi          = {10.1007/S11623-011-0198-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hansen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HartgeM11,
  author       = {Dagmar Hartge and
                  Sven M{\"{u}}ller},
  title        = {Verbraucherinformationen - Marktregulierung durch Transparenz? - Internationales
                  Symposium am 30./31. Mai 2011 in Potsdam},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {518},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0129-4},
  doi          = {10.1007/S11623-011-0129-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HartgeM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hase11,
  author       = {Friedhelm Hase},
  title        = {Forschung mit Sozialdaten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {875--878},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0205-9},
  doi          = {10.1007/S11623-011-0205-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hase11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HennigE11,
  author       = {Stefanie Hennig and
                  Stefan Etgeton},
  title        = {Arztbewertungen im Internet - Wie lassen sich solide Informationen
                  f{\"{u}}r Verbraucher und individueller Datenschutz in {\"{u}}bereinstimmung
                  bringen?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {841--845},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0199-3},
  doi          = {10.1007/S11623-011-0199-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HennigE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Herb11,
  author       = {Armin Herb},
  title        = {Datenschutzrechtliche Vorschriften im Rundfunkbeitragsstaatsvertrag
                  (RBStV)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {270--274},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0066-2},
  doi          = {10.1007/S11623-011-0066-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Herb11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HerkenhonerFM11,
  author       = {Ralph Herkenh{\"{o}}ner and
                  Harald Fischer and
                  Hermann de Meer},
  title        = {Outsourcing im Pflegedienst - Herausforderungen und L{\"{o}}sungen
                  in der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {870--874},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0204-x},
  doi          = {10.1007/S11623-011-0204-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HerkenhonerFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannF11,
  author       = {Eckehard Hermann and
                  Dirk Fox},
  title        = {Blick in die Glaskugel},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {231},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0056-4},
  doi          = {10.1007/S11623-011-0056-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HermannZ11,
  author       = {Eckehard Hermann and
                  Markus Zeilinger},
  title        = {{IT} Fr{\"{u}}hwarnung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {285},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0069-z},
  doi          = {10.1007/S11623-011-0069-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HermannZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hladjk11,
  author       = {J{\"{o}}rg Hladjk},
  title        = {Smart Metering und EU-Datenschutzrecht - Die Stellungnahme der Artikel-29-Datenschutzgruppe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {552--557},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0136-5},
  doi          = {10.1007/S11623-011-0136-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hladjk11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HolznagelR11,
  author       = {Bernd Holznagel and
                  Thorsten Ricke},
  title        = {Sicherung der Netzneutralit{\"{a}}t - Wechselseitige Auffangordnung
                  von Rundfunkund Telekommunikationsrecht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {611--617},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0149-0},
  doi          = {10.1007/S11623-011-0149-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HolznagelR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Hubner11,
  author       = {Gerold H{\"{u}}bner},
  title        = {Wie wirken Standards und Normen im Recht?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {56},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0015-0},
  doi          = {10.1007/S11623-011-0015-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Hubner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Humphreys11,
  author       = {Edward Humphreys},
  title        = {Information security management system standards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {7--11},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0004-3},
  doi          = {10.1007/S11623-011-0004-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Humphreys11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/IlliesLS11,
  author       = {Georg Illies and
                  Manfred Lochter and
                  Oliver Stein},
  title        = {Beh{\"{o}}rdliche Vorgaben zu kryptografischen Algorithmen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {807--811},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0190-z},
  doi          = {10.1007/S11623-011-0190-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/IlliesLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jeske11,
  author       = {Tobias Jeske},
  title        = {Datenschutzfreundliches Smart Metering - Ein praktikables L{\"{o}}sungskonzept},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {530--534},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0132-9},
  doi          = {10.1007/S11623-011-0132-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jeske11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Jiang11,
  author       = {Ge Jiang},
  title        = {Datenschutzrecht in China: heute und morgen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {642--647},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0155-2},
  doi          = {10.1007/S11623-011-0155-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Jiang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kang11,
  author       = {Jerry Kang},
  title        = {Self-surveillance privacy {\&} the Personal Data Guardian},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {624--628},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0151-6},
  doi          = {10.1007/S11623-011-0151-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KargT11,
  author       = {Moritz Karg and
                  Sven Thomsen},
  title        = {Einsatz von Piwik bei der Reichweitenanalyse - Ein Vorschlag des Unabh{\"{a}}ngigen
                  Landeszentrums f{\"{u}}r Datenschutz Schleswig-Holstein {(ULD)}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {489--492},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0120-0},
  doi          = {10.1007/S11623-011-0120-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KargT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KarlingerR11,
  author       = {Gregor Karlinger and
                  Franco Ruggieri},
  title        = {Verl{\"{a}}ssliche Archivierung von elektronischen Dokumenten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {41--42},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0011-4},
  doi          = {10.1007/S11623-011-0011-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KarlingerR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KasperKMP11,
  author       = {Markus Kasper and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar},
  title        = {Praktische Angriffe auf die Bitstromverschl{\"{u}}sselung von
                  Xilinx FPGAs},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {779--785},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0185-9},
  doi          = {10.1007/S11623-011-0185-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KasperKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KasperOP11,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  title        = {Seitenkanalanalyse kontaktloser SmartCards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {786--790},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0186-8},
  doi          = {10.1007/S11623-011-0186-8},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/KasperOP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KerstenS11,
  author       = {Heinrich Kersten and
                  Klaus{-}Werner Schr{\"{o}}der},
  title        = {20 Jahre IT-Sicherheitszertifizierung - Teil 1: Die Anf{\"{a}}nge},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {565--569},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0138-3},
  doi          = {10.1007/S11623-011-0138-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KerstenS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KerstenS11a,
  author       = {Heinrich Kersten and
                  Klaus{-}Werner Schr{\"{o}}der},
  title        = {20 Jahre IT-Sicherheitszertifizierung - Teil 2: Aufbau des Schemas
                  und erste Erfahrungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {650--656},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0157-0},
  doi          = {10.1007/S11623-011-0157-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KerstenS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KerstenS11b,
  author       = {Heinrich Kersten and
                  Klaus{-}Werner Schr{\"{o}}der},
  title        = {20 Jahre IT-Sicherheitszertifizierung - Teil 3: Erweiterung des Schemas
                  1998 bis 2007},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {726--731},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0173-0},
  doi          = {10.1007/S11623-011-0173-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KerstenS11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/KerstenS11c,
  author       = {Heinrich Kersten and
                  Klaus{-}Werner Schr{\"{o}}der},
  title        = {20 Jahre IT-Sicherheitszertifizierung - Teil 4: Aktuelle Situation
                  und Perspektiven},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {802--806},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0189-5},
  doi          = {10.1007/S11623-011-0189-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/KerstenS11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koller11,
  author       = {Dieter Koller},
  title        = {Kontaktlose dreidimensionale Erfassung eines Fingerabdrucks},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {175--178},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0045-7},
  doi          = {10.1007/S11623-011-0045-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Koppen11,
  author       = {Hajo K{\"{o}}ppen},
  title        = {Entwicklung der Computer-, IuK- und Internetkriminalit{\"{a}}t
                  im Jahr 2010 - Polizeiliche Kriminalstatistik verzeichnet auch 2010
                  Anstieg der Computer- und Internetkriminalit{\"{a}}t},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {718--720},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0171-2},
  doi          = {10.1007/S11623-011-0171-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Koppen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kubicek11,
  author       = {Herbert Kubicek},
  title        = {Akzeptanzprobleme sicherer elektronischer Identit{\"{a}}ten -
                  Ergebnisse einer vergleichenden Untersuchung in acht L{\"{a}}tdern},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {43--47},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0012-3},
  doi          = {10.1007/S11623-011-0012-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kubicek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutscha11,
  author       = {Martin Kutscha},
  title        = {Grundrechtlicher Pers{\"{o}}nlichkeitsschutz bei der Nutzung
                  des Internet - Zwischen individueller Selbstbestimmung und staatlicher
                  Verantwortung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {461--464},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0115-x},
  doi          = {10.1007/S11623-011-0115-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutscha11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Latzenhofer11,
  author       = {Ulrich Latzenhofer},
  title        = {Vertrauensw{\"{u}}rdige Liste - Erfahrungen aus den ersten beiden
                  Jahren},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {763--767},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0182-z},
  doi          = {10.1007/S11623-011-0182-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Latzenhofer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LaupichlerVBI11,
  author       = {Dennis Laupichler and
                  Stefan Vollmer and
                  Holger Bast and
                  Matthias Intemann},
  title        = {Das BSI-Schutzprofil: Anforderungen an den Datenschutz und die Datensicherheit
                  f{\"{u}}r Smart Metering Systeme - Neue Sicherheitsstandards
                  in der Versorgungsinfrastruktur},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {542--546},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0134-7},
  doi          = {10.1007/S11623-011-0134-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LaupichlerVBI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lechtenborger11,
  author       = {Jens Lechtenb{\"{o}}rger},
  title        = {Zur Sicherheit von De-Mail},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {268--269},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0065-3},
  doi          = {10.1007/S11623-011-0065-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lechtenborger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Lenz11,
  author       = {J{\"{o}}rg{-}M. Lenz},
  title        = {Veranstaltungsbesprechung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {913--914},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0213-9},
  doi          = {10.1007/S11623-011-0213-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Lenz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Leowsky11,
  author       = {Katja Leowsky},
  title        = {Befugnisse der Aufsichtsbeh{\"{o}}rde gegen{\"{u}}ber Rechtsanw{\"{a}}lten
                  - Eine Auseinandersetzung mit dem Beschluss des {KG} Berlin vom 20.08.2010,
                  1 Ws {(B)} 51/07 - 2 Ss 23/07; 317 OWi 3235/05},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {412--416},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0101-3},
  doi          = {10.1007/S11623-011-0101-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Leowsky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LepperhoffPT11,
  author       = {Niels Lepperhoff and
                  Bj{\"{o}}rn Petersdorf and
                  Sabine Thursch},
  title        = {Datenschutzverst{\"{o}}{\ss}e im Internet - Datenschutzbarometer
                  2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {707--710},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0168-x},
  doi          = {10.1007/S11623-011-0168-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LepperhoffPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/LerchBHRS11,
  author       = {Hana Lerch and
                  Beate Navarro Bullock and
                  Andreas Hotho and
                  Alexander Ro{\ss}nagel and
                  Gerd Stumme},
  title        = {Spam-Bek{\"{a}}mpfung im Web 2.0 - auch eine Frage des Datenschutzes
                  - Zur Auswahl von Spam-Erkennungsmerkmalen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {358--362},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0087-x},
  doi          = {10.1007/S11623-011-0087-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/LerchBHRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Llano11,
  author       = {Cristina Hermida del Llano},
  title        = {Die Verteidigung der individuellen Privatsph{\"{a}}re innerhalb
                  des "sozialen Exhibitionismus"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {639--641},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0154-3},
  doi          = {10.1007/S11623-011-0154-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Llano11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarnauS11,
  author       = {Ninja Marnau and
                  Eva Schlehahn},
  title        = {Cloud Computing und Safe Harbor},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {311--316},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0077-z},
  doi          = {10.1007/S11623-011-0077-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MarnauS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MarnauSSS11,
  author       = {Ninja Marnau and
                  Norbert Schirmer and
                  Eva Schlehahn and
                  Matthias Schunter},
  title        = {TClouds - Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen
                  Cloud},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {333--337},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0081-3},
  doi          = {10.1007/S11623-011-0081-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MarnauSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Menzel11,
  author       = {Hans{-}Joachim Menzel},
  title        = {Informationssysteme in Krankenhaus und Praxis und die Selbstbestimmung
                  des Patienten - Neue Konflikte im digitalisierten Gesundheitswesen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {853--858},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0201-0},
  doi          = {10.1007/S11623-011-0201-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Menzel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester11,
  author       = {Britta Alexandra Mester},
  title        = {Reform des Besch{\"{a}}ftigtendatenschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {79},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0021-2},
  doi          = {10.1007/S11623-011-0021-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Mester11a,
  author       = {Britta Alexandra Mester},
  title        = {Selbstbestimmung in einer Welt der Netze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {679},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0161-4},
  doi          = {10.1007/S11623-011-0161-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Mester11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MesterS11,
  author       = {Britta Alexandra Mester and
                  Sabine Seifert},
  title        = {Datenschutz bei Lernsoftware - Datenschutzrechtliche Probleme bei
                  der Nutzung von Lernsoftware an Schulen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {882--886},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0207-7},
  doi          = {10.1007/S11623-011-0207-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MesterS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Meyerholt11,
  author       = {Ulrich Meyerholt},
  title        = {Vom Recht auf informationelle Selbstbestimmung zum Zensus 2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {683--686},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0164-1},
  doi          = {10.1007/S11623-011-0164-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Meyerholt11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Muller11,
  author       = {Klaus J. M{\"{u}}ller},
  title        = {Verordnete Sicherheit - das Schutzprofil f{\"{u}}r das Smart
                  Metering Gateway - Eine Bewertung des neuen Schutzprofils},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {547--551},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0135-6},
  doi          = {10.1007/S11623-011-0135-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Muller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MullerRJ11,
  author       = {Wolf M{\"{u}}ller and
                  Jens{-}Peter Redlich and
                  Mathias Jeschke},
  title        = {Auth\({}^{\mbox{2}}\)(nPA) - Starke Authentifizierung mit nPA f{\"{u}}r
                  jedermann},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {465--470},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0116-9},
  doi          = {10.1007/S11623-011-0116-9},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/MullerRJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/MunchDE11,
  author       = {Isabel M{\"{u}}nch and
                  Clemens Doubrava and
                  Alex Didier Essoh},
  title        = {Eine Gef{\"{a}}hrdungsanalyse von Private Clouds - Sichere Virtualisierung
                  als Grundlage f{\"{u}}r sichere Private Cloud-Umgebungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {322--328},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0079-x},
  doi          = {10.1007/S11623-011-0079-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/MunchDE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Neumann11,
  author       = {Karsten Neumann},
  title        = {Keine Notwendigkeit f{\"{u}}r Konzernprivilegien bei Aussch{\"{o}}pfung
                  der Europ{\"{a}}ischen Datenschutzrichtlinie},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {343--345},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0083-1},
  doi          = {10.1007/S11623-011-0083-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Neumann11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Nguyen11,
  author       = {Alexander Nguyen},
  title        = {Video{\"{u}}berwachung in sensitiven Bereichen - Die Zul{\"{a}}ssigkeit
                  der Beobachtung sensitiver Daten nach deutschem und europ{\"{a}}ischem
                  Recht},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {715--717},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0170-3},
  doi          = {10.1007/S11623-011-0170-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Nguyen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Onstein11,
  author       = {Jost Onstein},
  title        = {Diskussionspapier des BfDI f{\"{u}}r eine Konzeption der Stiftung
                  Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {234},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0058-2},
  doi          = {10.1007/S11623-011-0058-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Onstein11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Paulus11,
  author       = {Sachar Paulus},
  title        = {Standards f{\"{u}}r Trusted Clouds - Anforderungen an Standards
                  und aktuelle Entwicklungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {317--321},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0078-y},
  doi          = {10.1007/S11623-011-0078-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Paulus11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/PetersenP11,
  author       = {Dominique Petersen and
                  Norbert Pohlmann},
  title        = {Ideales Internet-Fr{\"{u}}hwarnsystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {241--246},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0060-8},
  doi          = {10.1007/S11623-011-0060-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/PetersenP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Petri11,
  author       = {Thomas Petri},
  title        = {Die Richtlinie 2006/24/EG zur Vorratsspeicherung von Telekommunikationsverkehrsdaten
                  - Ein Problem des europ{\"{a}}ischen Grundrechtsschutzes},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {607--610},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0148-1},
  doi          = {10.1007/S11623-011-0148-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Petri11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Pocs11,
  author       = {Matthias Pocs},
  title        = {Gestaltung von Fahndungsdateien - Verfassungsvertr{\"{a}}glichkeit
                  biometrischer Systeme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {163--168},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0043-9},
  doi          = {10.1007/S11623-011-0043-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Pocs11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RaabeL11,
  author       = {Oliver Raabe and
                  Mieke Lorenz},
  title        = {Die datenschutzrechtliche Einwilligung im Internet der Dienste - Zur
                  Notwendigkeit qualifizierter elektronischer Signaturen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {279--284},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0068-0},
  doi          = {10.1007/S11623-011-0068-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RaabeL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RaabeLPWM11,
  author       = {Oliver Raabe and
                  Mieke Lorenz and
                  Frank Pallas and
                  Eva Weis and
                  Alfred Malina},
  title        = {14 Thesen zum Datenschutz im Smart Grid},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {519--523},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0130-y},
  doi          = {10.1007/S11623-011-0130-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RaabeLPWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rannenberg11,
  author       = {Kai Rannenberg},
  title        = {{ISO/IEC} standardization of identity management and privacy technologies
                  - Making {IT} Security and Biometrics contribute to better Identity
                  Management and Privacy},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {27--29},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0008-z},
  doi          = {10.1007/S11623-011-0008-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rannenberg11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11,
  author       = {Helmut Reimer},
  title        = {a-i3/BSI Symposium, Bochum, 12. / 13. April 2011},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {437},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0106-y},
  doi          = {10.1007/S11623-011-0106-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11a,
  author       = {Helmut Reimer},
  title        = {{\"{U}}berwachung - ein Spagat?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {443},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0109-8},
  doi          = {10.1007/S11623-011-0109-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11b,
  author       = {Helmut Reimer},
  title        = {Internet und internationale Politik},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {493},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0121-z},
  doi          = {10.1007/S11623-011-0121-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11c,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {578--586},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0141-8},
  doi          = {10.1007/S11623-011-0141-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11d,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {666--674},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0160-5},
  doi          = {10.1007/S11623-011-0160-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11e,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {741--748},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0176-x},
  doi          = {10.1007/S11623-011-0176-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11f,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {825--830},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0193-9},
  doi          = {10.1007/S11623-011-0193-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Reimer11g,
  author       = {Helmut Reimer},
  title        = {Report},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {906--913},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0212-x},
  doi          = {10.1007/S11623-011-0212-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Reimer11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ReimerW11,
  author       = {Helmut Reimer and
                  Christoph Wegener},
  title        = {{IT} Compliance und Governance: Cloud Computing erweitert den Horizont},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {363},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0088-9},
  doi          = {10.1007/S11623-011-0088-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ReimerW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Renner11,
  author       = {Stephan Renner},
  title        = {Smart Metering und Datenschutz in {\"{O}}sterreich - Empfehlungen
                  f{\"{u}}r die Einf{\"{u}}hrung intelligenter Messger{\"{a}}te},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {524--529},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0131-x},
  doi          = {10.1007/S11623-011-0131-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Renner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11,
  author       = {Karl Rihaczek},
  title        = {Das Navi},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {5},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0002-5},
  doi          = {10.1007/S11623-011-0002-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11a,
  author       = {Karl Rihaczek},
  title        = {Nur nicht Auffallen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {81},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0022-1},
  doi          = {10.1007/S11623-011-0022-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11b,
  author       = {Karl Rihaczek},
  title        = {Cloud in den Wolken},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {233},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0057-3},
  doi          = {10.1007/S11623-011-0057-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11c,
  author       = {Karl Rihaczek},
  title        = {Soll und 1st},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {309},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0075-1},
  doi          = {10.1007/S11623-011-0075-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11d,
  author       = {Karl Rihaczek},
  title        = {Sozial Gegenl{\"{a}}ufiges},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {385},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0094-y},
  doi          = {10.1007/S11623-011-0094-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11e,
  author       = {Karl Rihaczek},
  title        = {Vision Car2X},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {445},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0110-2},
  doi          = {10.1007/S11623-011-0110-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11f,
  author       = {Karl Rihaczek},
  title        = {Standards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {8},
  pages        = {517},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0128-5},
  doi          = {10.1007/S11623-011-0128-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11g,
  author       = {Karl Rihaczek},
  title        = {Otto},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {593},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0143-6},
  doi          = {10.1007/S11623-011-0143-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11h,
  author       = {Karl Rihaczek},
  title        = {Alte Deiche},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {681},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0162-3},
  doi          = {10.1007/S11623-011-0162-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rihaczek11i,
  author       = {Karl Rihaczek},
  title        = {Korpuskeln und das Ganze},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {839},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0197-5},
  doi          = {10.1007/S11623-011-0197-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rihaczek11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rose11,
  author       = {Edgar Rose},
  title        = {Betriebsvereinbarung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {136},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0034-x},
  doi          = {10.1007/S11623-011-0034-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rose11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RossnagelDH11,
  author       = {Alexander Ro{\ss}nagel and
                  Monika Desoi and
                  Gerrit Hornung},
  title        = {Gestufte Kontrolle bei Video{\"{u}}berwachungsanlagen - Ein Drei-Stufen-Modell
                  als Vorschlag zur grundrechts schonenden Gestaltung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {694--701},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0166-z},
  doi          = {10.1007/S11623-011-0166-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RossnagelDH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rost11,
  author       = {Martin Rost},
  title        = {Datenschutz in 3D - Daten, Prozesse und Schutzziele in einem Modell},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {351--354},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0085-z},
  doi          = {10.1007/S11623-011-0085-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rost11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/RostB11,
  author       = {Martin Rost and
                  Kirsten Bock},
  title        = {Privacy By Design und die Neuen Schutzziele - Grunds{\"{a}}tze,
                  Ziele und Anforderungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {30--35},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0009-y},
  doi          = {10.1007/S11623-011-0009-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/RostB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Roth11,
  author       = {J{\"{u}}rgen Roth},
  title        = {Zukunft der Informationsfreiheit - Symposium des Bundesbeauftragten
                  f{\"{u}}r den Datenschutz und die Informationsfreiheit am 8.
                  und 9. Juni 2011 in Berlin},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {594},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0144-5},
  doi          = {10.1007/S11623-011-0144-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Roth11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Rumpel11,
  author       = {Rainer Rumpel},
  title        = {Planung und Betrieb von Informationssicherheits-Managementsystemen
                  - Erfahrungen aus der Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {12--15},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0005-2},
  doi          = {10.1007/S11623-011-0005-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Rumpel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schaar11,
  author       = {Peter Schaar},
  title        = {Datenschutz muss mit einer Stimme sprechen!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {756},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0180-1},
  doi          = {10.1007/S11623-011-0180-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schaar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schafer11,
  author       = {Burkhard Schafer},
  title        = {All changed, changed utterly? - Privacy protection in post-Labour
                  Britain},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {634--638},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0153-4},
  doi          = {10.1007/S11623-011-0153-4},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schafer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchildT11,
  author       = {Hans{-}Hermann Schild and
                  Marie{-}Theres Tinnefeld},
  title        = {Datenverarbeitung im internationalen Konzern - Eine Betrachtung im
                  Lichte des Einsatzes von {SAP}},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {629--633},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0152-5},
  doi          = {10.1007/S11623-011-0152-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchildT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SchmidtJ11,
  author       = {Bernd Schmidt and
                  Christian Jakob},
  title        = {Die Zul{\"{a}}ssigkeit IT-gest{\"{u}}tzter Compliance- und
                  Risikomanagementsysteme nach der BDSG-Novelle},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {88--93},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0026-x},
  doi          = {10.1007/S11623-011-0026-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/SchmidtJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schnabel11,
  author       = {Christoph Schnabel},
  title        = {Die polizeiliche Video{\"{u}}berwachung {\"{o}}ffentlicher
                  Orte in Niedersachen - Anmerkung zu {VG} Hannover, Urteil vom 14.7.2011,
                  10 {A} 5452/10 (in diesem Heft)},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {879--881},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0206-8},
  doi          = {10.1007/S11623-011-0206-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schnabel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schuler11,
  author       = {Karin Schuler},
  title        = {Gesetz zum Besch{\"{a}}ftigtendatenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {126--128},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0032-z},
  doi          = {10.1007/S11623-011-0032-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schuler11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Schulz11,
  author       = {S{\"{o}}nke E. Schulz},
  title        = {Datenschutz beim E-Postbrief},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {263--267},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0064-4},
  doi          = {10.1007/S11623-011-0064-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Schulz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Seifert11,
  author       = {Bernd Seifert},
  title        = {Video{\"{u}}berwachung im k{\"{u}}nftigen Besch{\"{a}}ftigtendatenschutzrecht
                  - Was bleibt, was geht, was kommt?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {98--109},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0028-8},
  doi          = {10.1007/S11623-011-0028-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Seifert11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/SlamanigR11,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  title        = {Redigierbare Digitale Signaturen - Theorie und Praxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {757--762},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0181-0},
  doi          = {10.1007/S11623-011-0181-0},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/SlamanigR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Streinz11,
  author       = {Rudolf Streinz},
  title        = {Die Rechtsprechung des EuGH zum Datenschutz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {602--606},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0147-2},
  doi          = {10.1007/S11623-011-0147-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Streinz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tauber11,
  author       = {Arne Tauber},
  title        = {Elektronische Zustellung in Europa - Perspektiven eines grenz{\"{u}}berschreitenden
                  Einschreibens},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {774--778},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0184-x},
  doi          = {10.1007/S11623-011-0184-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tauber11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tillenburg11,
  author       = {Gereon Tillenburg},
  title        = {Stimmt die Stimme? - Biometriel{\"{o}}sungen im Einsatz},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {197--199},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0049-3},
  doi          = {10.1007/S11623-011-0049-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tillenburg11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tinnefeld11,
  author       = {Marie{-}Theres Tinnefeld},
  title        = {Privatheit als Voraussetzung menschenrechtlicher Freir{\"{a}}ume?},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {598--601},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0146-3},
  doi          = {10.1007/S11623-011-0146-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tinnefeld11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB11,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {Vom {\"{u}}berleben des Menschenrechts auf Privatheit in der
                  digitalen Revolution},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {591},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0142-7},
  doi          = {10.1007/S11623-011-0142-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldB11a,
  author       = {Marie{-}Theres Tinnefeld and
                  Benedikt Buchner},
  title        = {The European Union {(EU)} after the Treaty of Lisbon},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {9},
  pages        = {657},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0158-z},
  doi          = {10.1007/S11623-011-0158-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldB11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/TinnefeldS11,
  author       = {Marie{-}Theres Tinnefeld and
                  Christoph Schnabel},
  title        = {Buchbesprechungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {225--226},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0054-6},
  doi          = {10.1007/S11623-011-0054-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/TinnefeldS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Tschersich11,
  author       = {Thomas Tschersich},
  title        = {Zur Notwendigkeit eines Umdenkens beim Thema Cybersicherheit},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {408--411},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0100-4},
  doi          = {10.1007/S11623-011-0100-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Tschersich11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Venzke11,
  author       = {Sven Venzke},
  title        = {Social Media Marketing - Eine datenschutzrechtliche Orientierungshilfe},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {387--392},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0096-9},
  doi          = {10.1007/S11623-011-0096-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Venzke11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WachterG11,
  author       = {Michael W{\"{a}}chter and
                  Joachim Gruber},
  title        = {Buchbesprechungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {12},
  pages        = {914--915},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0214-8},
  doi          = {10.1007/S11623-011-0214-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WachterG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wagner11,
  author       = {Edgar Wagner},
  title        = {Datenschutz-Kodex f{\"{u}}r Geodatendienste und Gesetzentwurf
                  des {BMI} zur "roten Linie" sind unzureichend!},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {2},
  pages        = {82},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0023-0},
  doi          = {10.1007/S11623-011-0023-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wagner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wegener11,
  author       = {Christoph Wegener},
  title        = {Wolkige Zeiten},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {5},
  pages        = {307},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0074-2},
  doi          = {10.1007/S11623-011-0074-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wegener11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Weichert11,
  author       = {Thilo Weichert},
  title        = {Datenschutz im Anti-Doping-Kampf - Zugleich Besprechung des Buches
                  "Datenschutz im Anti-Doping-Kampf" von Lars Mortsiefer},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {10},
  pages        = {702--706},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0167-y},
  doi          = {10.1007/S11623-011-0167-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Weichert11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WeigmannDLTJ11,
  author       = {Uwe Weigmann and
                  Knut Deimer and
                  Christian Leininger and
                  Ludwig Turba and
                  Steffen Jurran},
  title        = {Biometrie am {BBI} - Chancen und Randbedingungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {3},
  pages        = {179--182},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0046-6},
  doi          = {10.1007/S11623-011-0046-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WeigmannDLTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wendt11,
  author       = {Mario Wendt},
  title        = {Smart Grid - eine Herausforderung aus Sicht der Standardisierung und
                  der IT-Sicherheit oder schon "business-as-usual"},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {22--26},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0007-0},
  doi          = {10.1007/S11623-011-0007-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wendt11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wieczorek11,
  author       = {Mirko Andreas Wieczorek},
  title        = {Informationsbasiertes Pers{\"{o}}nlichkeitsrecht - {\"{U}}berlegungen
                  zur Restauration des Pers{\"{o}}nlichkeitsschutzes im Internetzeitalter},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {476--481},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0118-7},
  doi          = {10.1007/S11623-011-0118-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wieczorek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Wiele11,
  author       = {Johannes Wiele},
  title        = {Vertrauensfragen - Unternehmenssicherheit und F{\"{u}}hrungspraxis},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {471--475},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0117-8},
  doi          = {10.1007/S11623-011-0117-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Wiele11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Winkler11,
  author       = {Thomas Winkler},
  title        = {Vertrauensw{\"{u}}rdige Video{\"{u}}berwachung - Sichere
                  intelligente Kameras mit Trusted Computing},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {797--801},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0188-6},
  doi          = {10.1007/S11623-011-0188-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Winkler11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WinterLZH11,
  author       = {Philipp Winter and
                  Harald Lampesberger and
                  Markus Zeilinger and
                  Eckehard Hermann},
  title        = {Anomalieerkennung in Computernetzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {4},
  pages        = {235--239},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0059-1},
  doi          = {10.1007/S11623-011-0059-1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WinterLZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/WolffB11,
  author       = {Heinrich Amadeus Wolff and
                  Stefan Brink},
  title        = {Neuregelung der Video{\"{u}}berwachung in Rheinland-Pfalz - Verfassungsrechtliche
                  Grenzen des Einsatzes von Attrappen durch die {\"{o}}ffentliche
                  Hand},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {7},
  pages        = {447--450},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0112-0},
  doi          = {10.1007/S11623-011-0112-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/WolffB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X11,
  title        = {Datenschutzbeauftragte des Bundes und der L{\"{a}}nder: Entschlie{\ss}ungen
                  der 80. Konferenz - 3./4. November 2010},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {1},
  pages        = {48--49},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0013-2},
  doi          = {10.1007/S11623-011-0013-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/X11a,
  title        = {Datenschutzbeauftragte des Bundes und der L{\"{a}}nder: Entschlie{\ss}ungen
                  der 82. Konferenz vom 28./29. September 2011 in M{\"{u}}nchen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {812--815},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0191-y},
  doi          = {10.1007/S11623-011-0191-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/X11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/ZeffererTL11,
  author       = {Thomas Zefferer and
                  Peter Teufl and
                  Herbert Leitold},
  title        = {Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung
                  elektronischer Signaturen durch die Verwendung mobiler Endger{\"{a}}te},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {11},
  pages        = {768--773},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0183-y},
  doi          = {10.1007/S11623-011-0183-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/ZeffererTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Zoebisch11,
  author       = {Michael Zoebisch},
  title        = {Stimmungsanalyse durch Call-Center - Datenschutzrechtliche Zul{\"{a}}ssigkeit
                  der Analyse der emotionalen Verfassung anhand der Stimme},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {35},
  number       = {6},
  pages        = {394--397},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11623-011-0097-8},
  doi          = {10.1007/S11623-011-0097-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Zoebisch11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics