Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dud/dud35.bht:"
@article{DBLP:journals/dud/Abate11, author = {Constantin Abate}, title = {Online-durchsuchung, Quellentelekommunikations{\"{u}}berwachung und die t{\"{u}}cke im detail - Einfluss rechtlicher und technischer Entwicklungen auf verdeckte Online-Ermittlungen zur gew{\"{a}}hrleistung der inneren sicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {122--125}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0031-0}, doi = {10.1007/S11623-011-0031-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Abate11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Abate11a, author = {Constantin Abate}, title = {Pr{\"{a}}ventive und repressive Video{\"{u}}berwachung {\"{o}}ffentlicher Pl{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {451--454}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0113-z}, doi = {10.1007/S11623-011-0113-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Abate11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Alsbih11, author = {Amir Alsbih}, title = {Der reale Wert einer IP-Adresse}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {482--488}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0119-6}, doi = {10.1007/S11623-011-0119-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Alsbih11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Asaj11, author = {Naim Asaj}, title = {Datenschutz im Fahrzeug - {\"{U}}bersicht, Aspekte und erste L{\"{o}}sungsans{\"{a}}tze}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {558--564}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0137-4}, doi = {10.1007/S11623-011-0137-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Asaj11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Baum11, author = {Gerhart R. Baum}, title = {Unerledigte Verfassungsauftr{\"{a}}ge}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {595--597}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0145-4}, doi = {10.1007/S11623-011-0145-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Baum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bausewein11, author = {Christoph Bausewein}, title = {Der sachliche Anwendungsbereich des {BDSG} im Besch{\"{a}}ftigtendatenschutz - Reichweite des {\textsection} 32 Absatz 2 {BDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {94--97}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0027-9}, doi = {10.1007/S11623-011-0027-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bausewein11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BeisenherzT11, author = {Gerhard Beisenherz and Marie{-}Theres Tinnefeld}, title = {Aspekte der Einwilligung - Zivil- und strafrechtliche Bez{\"{u}}ge der Einwilligung im Datenschutzrecht}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {110--115}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0029-7}, doi = {10.1007/S11623-011-0029-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BeisenherzT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Bienert11, author = {Jens Bienert}, title = {Mikrozensus}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {732}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0174-z}, doi = {10.1007/S11623-011-0174-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Bienert11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Biewald11, author = {Marco Biewald}, title = {Externe Dienstleister im Krankenhaus und {\"{a}}rztliche Schweigepflicht - eine rechtliche Unsicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {867--869}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0203-y}, doi = {10.1007/S11623-011-0203-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Biewald11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BirkHW11, author = {Dominik Birk and Dennis Heinson and Christoph Wegener}, title = {Virtuelle Spurensuche - Digitale Forensik in Cloud-Umgebungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {329--332}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0080-4}, doi = {10.1007/S11623-011-0080-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BirkHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BirkholzESS11, author = {Henk Birkholz and Carsten Elfers and Bernd Samjeske and Karsten Sohr}, title = {Unternehmens{\"{u}}bergreifender Austausch von sicherheitsrelevantem Wissen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {258--261}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0063-5}, doi = {10.1007/S11623-011-0063-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BirkholzESS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BraunlichRGR11, author = {Katharina Br{\"{a}}unlich and Philipp Richter and R{\"{u}}diger Grimm and Alexander Ro{\ss}nagel}, title = {Verbindung von CC-Schutzprofilen mit der Methode rechtlicher IT-Gestaltung {KORA} - Anwendungsbeispiel: Wahlgeheimnis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {129--135}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0033-y}, doi = {10.1007/S11623-011-0033-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BraunlichRGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BrunnerSHRT11, author = {Martin Brunner and Peter Schoo and Hans Hofinger and Christopher Roblee and Sascha Todt}, title = {Forschungsans{\"{a}}tze zur Effizienzsteigerung heutiger IT-Fr{\"{u}}hwarnsysteme}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {253--257}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0062-6}, doi = {10.1007/S11623-011-0062-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/BrunnerSHRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Brunst11, author = {Phillip W. Brunst}, title = {Staatlicher Zugang zur digitalen Identit{\"{a}}t - Erosion der Anonymit{\"{a}}t im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {618--623}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0150-7}, doi = {10.1007/S11623-011-0150-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Brunst11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner11, author = {Benedikt Buchner}, title = {DuD Recht}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {658--665}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0159-y}, doi = {10.1007/S11623-011-0159-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner11a, author = {Benedikt Buchner}, title = {Health 2.0}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {837}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0196-6}, doi = {10.1007/S11623-011-0196-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Buchner11b, author = {Benedikt Buchner}, title = {Recht auf Akteneinsicht}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {896}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0210-z}, doi = {10.1007/S11623-011-0210-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Buchner11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Busch11, author = {Christoph Busch}, title = {Datensicherheit unerw{\"{u}}nscht?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {210}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0051-9}, doi = {10.1007/S11623-011-0051-9}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Busch11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/BuschKABFFMNNOOSWWXZ11, author = {Christoph Busch and Ulrike Korte and Sebastian Abt and Christian B{\"{o}}hm and Ines F{\"{a}}rber and Sergej Fries and Johannes Merkle and Claudia Nickel and Alexander Nouak and Alexander Opel and Annahita Oswald and Thomas Seidl and Bianca Wackersreuther and Peter Wackersreuther and Xuebing Zhou}, title = {Biometric Template Protection - Ein Bericht {\"{u}}ber das Projekt BioKeyS}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {183--191}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0047-5}, doi = {10.1007/S11623-011-0047-5}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/BuschKABFFMNNOOSWWXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Caspar11, author = {Johannes Caspar}, title = {Arbeitnehmerdatenschutz - Im Spannungsfeld zwischen informationeller Selbstbestimmung und betrieblicher Kontrolle}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {687--693}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0165-0}, doi = {10.1007/S11623-011-0165-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Caspar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Damm11, author = {Reinhard Damm}, title = {Pr{\"{a}}diktive Gesundheitsinformationen in der modernen Medizin}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {859--866}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0202-z}, doi = {10.1007/S11623-011-0202-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Damm11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Daubler-Gmelin11, author = {Herta D{\"{a}}ubler{-}Gmelin}, title = {{AEO} - Zertifizierung, Terrorlisten und Mitarbeiterscreening}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {455--459}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0114-y}, doi = {10.1007/S11623-011-0114-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Daubler-Gmelin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Doesinger11, author = {Stephan Doesinger}, title = {Medienf{\"{u}}hrerschein, wozu?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {648--649}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0156-1}, doi = {10.1007/S11623-011-0156-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Doesinger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Dotzler11, author = {Florian Dotzler}, title = {Eine datenschutzrechtlich motivierte Untersuchung Tippverhalten basierender Authentifizierungssysteme - Darstellung am Beispiel textgebundener L{\"{o}}sungen zur Benutzererkennung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {192--196}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0048-4}, doi = {10.1007/S11623-011-0048-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Dotzler11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DrahanskyDV11, author = {Martin Drahansk{\'{y}} and Radim Dvorak and Jan Vana}, title = {Personenerkennung mittels 3D Handgeometrie}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {169--173}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0044-8}, doi = {10.1007/S11623-011-0044-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/DrahanskyDV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Ebeling11, author = {Michael Ebeling}, title = {Die Untiefen des Zensus 2011 - Kritik an der Volksz{\"{a}}hlung 2011}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {721--725}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0172-1}, doi = {10.1007/S11623-011-0172-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Ebeling11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EckertK11, author = {Claudia Eckert and Christoph Krau{\ss}}, title = {Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {535--541}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0133-8}, doi = {10.1007/S11623-011-0133-8}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/EckertK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EichlerW11, author = {Carolyn Eichler and Thilo Weichert}, title = {EC-Kartennutzung, elektronisches Lastschriftverfahren und Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {201--209}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0050-x}, doi = {10.1007/S11623-011-0050-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EichlerW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/EngelberthFGGHHTW11, author = {Markus Engelberth and Felix C. Freiling and Jan G{\"{o}}bel and Christian Gorecki and Thorsten Holz and Ralf Hund and Philipp Trinius and Carsten Willems}, title = {Das Internet-Malware-Analyse-System (InMAS) - Ein System zur gro{\ss}fl{\"{a}}chigen Sammlung und Analyse von Schadsoftware im Internet}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {247--252}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0061-7}, doi = {10.1007/S11623-011-0061-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/EngelberthFGGHHTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Erd11, author = {Rainer Erd}, title = {Auftragsdatenverarbeitung in sicheren Drittstaaten - Pl{\"{a}}doyer f{\"{u}}r eine Reform von {\textsection} 3 Absatz 8 Satz 3 {BDSG}}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {275--278}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0067-1}, doi = {10.1007/S11623-011-0067-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Erd11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Erkeling11, author = {Sabrina Erkeling}, title = {Datenschutz in Online-spielen und anderen Virtuellen Welten - Die Verkn{\"{u}}pfung der realen identit{\"{a}}t mit der Virtuellen Welt}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {116--121}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0030-1}, doi = {10.1007/S11623-011-0030-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Erkeling11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FederrathFHMSW11, author = {Hannes Federrath and Karl{-}Peter Fuchs and Dominik Herrmann and Daniel Maier and Florian Scheuer and Kai Wagner}, title = {Grenzen des "digitalen Radiergummis"}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {403--407}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0099-6}, doi = {10.1007/S11623-011-0099-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FederrathFHMSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FederrathGH11, author = {Hannes Federrath and Christoph Gerber and Dominik Herrmann}, title = {Verhaltensbasierte Verkettung von Internetsitzungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {791--796}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0187-7}, doi = {10.1007/S11623-011-0187-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FederrathGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FernandezH11, author = {Manuel J. Calvo Fernandez and Daniela Heinemann}, title = {Datenschutz beim Einsatz von Leiharbeitnehmern}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {711--714}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0169-9}, doi = {10.1007/S11623-011-0169-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FernandezH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FiedlerT11, author = {Arno Fiedler and Christoph Thiel}, title = {Signaturstandardisierung: Selbstzweck oder Notwendigkeit? - Die Langzeitvalidierung von PDF-Dokumenten als gutes Beispiel}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {36--40}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0010-5}, doi = {10.1007/S11623-011-0010-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FiedlerT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox11, author = {Dirk Fox}, title = {Betriebswirtschaftliche Bewertung von Security Investments in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {50--55}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0014-1}, doi = {10.1007/S11623-011-0014-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox11a, author = {Dirk Fox}, title = {Datenschutzaufreger}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {383}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0093-z}, doi = {10.1007/S11623-011-0093-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox11b, author = {Dirk Fox}, title = {Perimetersicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {421}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0103-1}, doi = {10.1007/S11623-011-0103-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fox11c, author = {Dirk Fox}, title = {Schutzprofile - Protection Profiles}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {570}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0139-2}, doi = {10.1007/S11623-011-0139-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fox11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FoxM11, author = {Dirk Fox and Klaus J. M{\"{u}}ller}, title = {Viele Daten um Nichts}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {515--516}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0127-6}, doi = {10.1007/S11623-011-0127-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FoxM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FoxS11, author = {Dirk Fox and Peter Schartner}, title = {Geheimschriften in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {753}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0178-8}, doi = {10.1007/S11623-011-0178-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FoxS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FraenkelH11, author = {Reinhard Fraenkel and Volker Hammer}, title = {Vom Staats- zum Verfassungstrojaner}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {887--889}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0208-6}, doi = {10.1007/S11623-011-0208-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FraenkelH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/FreundM11, author = {Bernhard Freund and Andreas M{\"{u}}glich}, title = {Buchbesprechungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {301--302}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0072-4}, doi = {10.1007/S11623-011-0072-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/FreundM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy11, author = {Walter Fumy}, title = {Standards bringen vielf{\"{a}}ltig Nutzen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {3}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0001-6}, doi = {10.1007/S11623-011-0001-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Fumy11a, author = {Walter Fumy}, title = {Maschinenlesbare Reisedokumente}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {16--21}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0006-1}, doi = {10.1007/S11623-011-0006-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Fumy11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gaulke11, author = {Markus Gaulke}, title = {Pr{\"{u}}fung der Einhaltung der technischen und organisatorischen Ma{\ss}nahmen bei Auftragsdatenverarbeitungen - Bescheinigung des datenschutzrelevanten Kontrollsystems nach Pr{\"{u}}fungsstandard {ISAE} 3000}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {417--420}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0102-2}, doi = {10.1007/S11623-011-0102-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gaulke11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Gaycken11, author = {Sandro Gaycken}, title = {Informationelle Selbstbestimmung und narrativistische Rezeption - Zur Konstruktion informationellen Vertrauens}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {346--350}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0084-0}, doi = {10.1007/S11623-011-0084-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Gaycken11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GerstnerGH11, author = {Markus Gerstner and Georg Gomm and Christian Hansen}, title = {Erh{\"{o}}hte Sicherheit durch De-Perimetrisierung - Mehrwert durch Einsatz des Jericho-Konzeptes}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {398--402}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0098-7}, doi = {10.1007/S11623-011-0098-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GerstnerGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/GiebichensteinW11, author = {R{\"{u}}diger Giebichenstein and Andreas Weiss}, title = {Zertifizierte Cloud durch das EuroCloud Star Audit SaaS - Ein Best Practice-Ansatz zur Auswahl eines vertrauensw{\"{u}}rdigen Cloud-Anbieters}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {338--342}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0082-2}, doi = {10.1007/S11623-011-0082-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/GiebichensteinW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Goetz11, author = {Christoph F.{-}J. Goetz}, title = {Gesundheitstelematik zwischen konventioneller Wahrnehmung und neuen Herausforderungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {847--852}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0200-1}, doi = {10.1007/S11623-011-0200-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Goetz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HaaseHR11, author = {Martin Sebastian Haase and Thorsten Heermann and Wolfgang Rottwinkel}, title = {Der neue Besch{\"{a}}ftigtendatenschutz im Bewerbungs- und Einstellungsverfahren}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {83--87}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0024-z}, doi = {10.1007/S11623-011-0024-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HaaseHR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HammerF11, author = {Volker Hammer and Reinhard Fraenkel}, title = {L{\"{o}}schklassen - Standardisierte Fristen f{\"{u}}r die L{\"{o}}schung personenbezogener Daten}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {890--895}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0209-5}, doi = {10.1007/S11623-011-0209-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HammerF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hansen11, author = {Marit Hansen}, title = {Optimierte Verantwortung/slosigkeit - Bericht {\"{u}}ber die Sommerakademie 2011}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {840}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0198-4}, doi = {10.1007/S11623-011-0198-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hansen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HartgeM11, author = {Dagmar Hartge and Sven M{\"{u}}ller}, title = {Verbraucherinformationen - Marktregulierung durch Transparenz? - Internationales Symposium am 30./31. Mai 2011 in Potsdam}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {518}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0129-4}, doi = {10.1007/S11623-011-0129-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HartgeM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hase11, author = {Friedhelm Hase}, title = {Forschung mit Sozialdaten}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {875--878}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0205-9}, doi = {10.1007/S11623-011-0205-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hase11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HennigE11, author = {Stefanie Hennig and Stefan Etgeton}, title = {Arztbewertungen im Internet - Wie lassen sich solide Informationen f{\"{u}}r Verbraucher und individueller Datenschutz in {\"{u}}bereinstimmung bringen?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {841--845}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0199-3}, doi = {10.1007/S11623-011-0199-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HennigE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Herb11, author = {Armin Herb}, title = {Datenschutzrechtliche Vorschriften im Rundfunkbeitragsstaatsvertrag (RBStV)}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {270--274}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0066-2}, doi = {10.1007/S11623-011-0066-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Herb11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HerkenhonerFM11, author = {Ralph Herkenh{\"{o}}ner and Harald Fischer and Hermann de Meer}, title = {Outsourcing im Pflegedienst - Herausforderungen und L{\"{o}}sungen in der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {870--874}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0204-x}, doi = {10.1007/S11623-011-0204-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HerkenhonerFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannF11, author = {Eckehard Hermann and Dirk Fox}, title = {Blick in die Glaskugel}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {231}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0056-4}, doi = {10.1007/S11623-011-0056-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HermannZ11, author = {Eckehard Hermann and Markus Zeilinger}, title = {{IT} Fr{\"{u}}hwarnung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {285}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0069-z}, doi = {10.1007/S11623-011-0069-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HermannZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hladjk11, author = {J{\"{o}}rg Hladjk}, title = {Smart Metering und EU-Datenschutzrecht - Die Stellungnahme der Artikel-29-Datenschutzgruppe}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {552--557}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0136-5}, doi = {10.1007/S11623-011-0136-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hladjk11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/HolznagelR11, author = {Bernd Holznagel and Thorsten Ricke}, title = {Sicherung der Netzneutralit{\"{a}}t - Wechselseitige Auffangordnung von Rundfunkund Telekommunikationsrecht}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {611--617}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0149-0}, doi = {10.1007/S11623-011-0149-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/HolznagelR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Hubner11, author = {Gerold H{\"{u}}bner}, title = {Wie wirken Standards und Normen im Recht?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {56}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0015-0}, doi = {10.1007/S11623-011-0015-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Hubner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Humphreys11, author = {Edward Humphreys}, title = {Information security management system standards}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {7--11}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0004-3}, doi = {10.1007/S11623-011-0004-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Humphreys11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/IlliesLS11, author = {Georg Illies and Manfred Lochter and Oliver Stein}, title = {Beh{\"{o}}rdliche Vorgaben zu kryptografischen Algorithmen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {807--811}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0190-z}, doi = {10.1007/S11623-011-0190-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/IlliesLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jeske11, author = {Tobias Jeske}, title = {Datenschutzfreundliches Smart Metering - Ein praktikables L{\"{o}}sungskonzept}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {530--534}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0132-9}, doi = {10.1007/S11623-011-0132-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jeske11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Jiang11, author = {Ge Jiang}, title = {Datenschutzrecht in China: heute und morgen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {642--647}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0155-2}, doi = {10.1007/S11623-011-0155-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Jiang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kang11, author = {Jerry Kang}, title = {Self-surveillance privacy {\&} the Personal Data Guardian}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {624--628}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0151-6}, doi = {10.1007/S11623-011-0151-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KargT11, author = {Moritz Karg and Sven Thomsen}, title = {Einsatz von Piwik bei der Reichweitenanalyse - Ein Vorschlag des Unabh{\"{a}}ngigen Landeszentrums f{\"{u}}r Datenschutz Schleswig-Holstein {(ULD)}}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {489--492}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0120-0}, doi = {10.1007/S11623-011-0120-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KargT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KarlingerR11, author = {Gregor Karlinger and Franco Ruggieri}, title = {Verl{\"{a}}ssliche Archivierung von elektronischen Dokumenten}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {41--42}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0011-4}, doi = {10.1007/S11623-011-0011-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KarlingerR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KasperKMP11, author = {Markus Kasper and Timo Kasper and Amir Moradi and Christof Paar}, title = {Praktische Angriffe auf die Bitstromverschl{\"{u}}sselung von Xilinx FPGAs}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {779--785}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0185-9}, doi = {10.1007/S11623-011-0185-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KasperKMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KasperOP11, author = {Timo Kasper and David F. Oswald and Christof Paar}, title = {Seitenkanalanalyse kontaktloser SmartCards}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {786--790}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0186-8}, doi = {10.1007/S11623-011-0186-8}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/KasperOP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KerstenS11, author = {Heinrich Kersten and Klaus{-}Werner Schr{\"{o}}der}, title = {20 Jahre IT-Sicherheitszertifizierung - Teil 1: Die Anf{\"{a}}nge}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {565--569}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0138-3}, doi = {10.1007/S11623-011-0138-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KerstenS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KerstenS11a, author = {Heinrich Kersten and Klaus{-}Werner Schr{\"{o}}der}, title = {20 Jahre IT-Sicherheitszertifizierung - Teil 2: Aufbau des Schemas und erste Erfahrungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {650--656}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0157-0}, doi = {10.1007/S11623-011-0157-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KerstenS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KerstenS11b, author = {Heinrich Kersten and Klaus{-}Werner Schr{\"{o}}der}, title = {20 Jahre IT-Sicherheitszertifizierung - Teil 3: Erweiterung des Schemas 1998 bis 2007}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {726--731}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0173-0}, doi = {10.1007/S11623-011-0173-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KerstenS11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/KerstenS11c, author = {Heinrich Kersten and Klaus{-}Werner Schr{\"{o}}der}, title = {20 Jahre IT-Sicherheitszertifizierung - Teil 4: Aktuelle Situation und Perspektiven}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {802--806}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0189-5}, doi = {10.1007/S11623-011-0189-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/KerstenS11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koller11, author = {Dieter Koller}, title = {Kontaktlose dreidimensionale Erfassung eines Fingerabdrucks}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {175--178}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0045-7}, doi = {10.1007/S11623-011-0045-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Koppen11, author = {Hajo K{\"{o}}ppen}, title = {Entwicklung der Computer-, IuK- und Internetkriminalit{\"{a}}t im Jahr 2010 - Polizeiliche Kriminalstatistik verzeichnet auch 2010 Anstieg der Computer- und Internetkriminalit{\"{a}}t}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {718--720}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0171-2}, doi = {10.1007/S11623-011-0171-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Koppen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kubicek11, author = {Herbert Kubicek}, title = {Akzeptanzprobleme sicherer elektronischer Identit{\"{a}}ten - Ergebnisse einer vergleichenden Untersuchung in acht L{\"{a}}tdern}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {43--47}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0012-3}, doi = {10.1007/S11623-011-0012-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kubicek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Kutscha11, author = {Martin Kutscha}, title = {Grundrechtlicher Pers{\"{o}}nlichkeitsschutz bei der Nutzung des Internet - Zwischen individueller Selbstbestimmung und staatlicher Verantwortung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {461--464}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0115-x}, doi = {10.1007/S11623-011-0115-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Kutscha11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Latzenhofer11, author = {Ulrich Latzenhofer}, title = {Vertrauensw{\"{u}}rdige Liste - Erfahrungen aus den ersten beiden Jahren}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {763--767}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0182-z}, doi = {10.1007/S11623-011-0182-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Latzenhofer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LaupichlerVBI11, author = {Dennis Laupichler and Stefan Vollmer and Holger Bast and Matthias Intemann}, title = {Das BSI-Schutzprofil: Anforderungen an den Datenschutz und die Datensicherheit f{\"{u}}r Smart Metering Systeme - Neue Sicherheitsstandards in der Versorgungsinfrastruktur}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {542--546}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0134-7}, doi = {10.1007/S11623-011-0134-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LaupichlerVBI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lechtenborger11, author = {Jens Lechtenb{\"{o}}rger}, title = {Zur Sicherheit von De-Mail}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {268--269}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0065-3}, doi = {10.1007/S11623-011-0065-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lechtenborger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Lenz11, author = {J{\"{o}}rg{-}M. Lenz}, title = {Veranstaltungsbesprechung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {913--914}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0213-9}, doi = {10.1007/S11623-011-0213-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Lenz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Leowsky11, author = {Katja Leowsky}, title = {Befugnisse der Aufsichtsbeh{\"{o}}rde gegen{\"{u}}ber Rechtsanw{\"{a}}lten - Eine Auseinandersetzung mit dem Beschluss des {KG} Berlin vom 20.08.2010, 1 Ws {(B)} 51/07 - 2 Ss 23/07; 317 OWi 3235/05}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {412--416}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0101-3}, doi = {10.1007/S11623-011-0101-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Leowsky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LepperhoffPT11, author = {Niels Lepperhoff and Bj{\"{o}}rn Petersdorf and Sabine Thursch}, title = {Datenschutzverst{\"{o}}{\ss}e im Internet - Datenschutzbarometer 2010}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {707--710}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0168-x}, doi = {10.1007/S11623-011-0168-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LepperhoffPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/LerchBHRS11, author = {Hana Lerch and Beate Navarro Bullock and Andreas Hotho and Alexander Ro{\ss}nagel and Gerd Stumme}, title = {Spam-Bek{\"{a}}mpfung im Web 2.0 - auch eine Frage des Datenschutzes - Zur Auswahl von Spam-Erkennungsmerkmalen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {358--362}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0087-x}, doi = {10.1007/S11623-011-0087-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/LerchBHRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Llano11, author = {Cristina Hermida del Llano}, title = {Die Verteidigung der individuellen Privatsph{\"{a}}re innerhalb des "sozialen Exhibitionismus"}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {639--641}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0154-3}, doi = {10.1007/S11623-011-0154-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Llano11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MarnauS11, author = {Ninja Marnau and Eva Schlehahn}, title = {Cloud Computing und Safe Harbor}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {311--316}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0077-z}, doi = {10.1007/S11623-011-0077-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MarnauS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MarnauSSS11, author = {Ninja Marnau and Norbert Schirmer and Eva Schlehahn and Matthias Schunter}, title = {TClouds - Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {333--337}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0081-3}, doi = {10.1007/S11623-011-0081-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MarnauSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Menzel11, author = {Hans{-}Joachim Menzel}, title = {Informationssysteme in Krankenhaus und Praxis und die Selbstbestimmung des Patienten - Neue Konflikte im digitalisierten Gesundheitswesen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {853--858}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0201-0}, doi = {10.1007/S11623-011-0201-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Menzel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester11, author = {Britta Alexandra Mester}, title = {Reform des Besch{\"{a}}ftigtendatenschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {79}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0021-2}, doi = {10.1007/S11623-011-0021-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Mester11a, author = {Britta Alexandra Mester}, title = {Selbstbestimmung in einer Welt der Netze}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {679}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0161-4}, doi = {10.1007/S11623-011-0161-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Mester11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MesterS11, author = {Britta Alexandra Mester and Sabine Seifert}, title = {Datenschutz bei Lernsoftware - Datenschutzrechtliche Probleme bei der Nutzung von Lernsoftware an Schulen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {882--886}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0207-7}, doi = {10.1007/S11623-011-0207-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MesterS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Meyerholt11, author = {Ulrich Meyerholt}, title = {Vom Recht auf informationelle Selbstbestimmung zum Zensus 2011}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {683--686}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0164-1}, doi = {10.1007/S11623-011-0164-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Meyerholt11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Muller11, author = {Klaus J. M{\"{u}}ller}, title = {Verordnete Sicherheit - das Schutzprofil f{\"{u}}r das Smart Metering Gateway - Eine Bewertung des neuen Schutzprofils}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {547--551}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0135-6}, doi = {10.1007/S11623-011-0135-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Muller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MullerRJ11, author = {Wolf M{\"{u}}ller and Jens{-}Peter Redlich and Mathias Jeschke}, title = {Auth\({}^{\mbox{2}}\)(nPA) - Starke Authentifizierung mit nPA f{\"{u}}r jedermann}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {465--470}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0116-9}, doi = {10.1007/S11623-011-0116-9}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/MullerRJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/MunchDE11, author = {Isabel M{\"{u}}nch and Clemens Doubrava and Alex Didier Essoh}, title = {Eine Gef{\"{a}}hrdungsanalyse von Private Clouds - Sichere Virtualisierung als Grundlage f{\"{u}}r sichere Private Cloud-Umgebungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {322--328}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0079-x}, doi = {10.1007/S11623-011-0079-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/MunchDE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Neumann11, author = {Karsten Neumann}, title = {Keine Notwendigkeit f{\"{u}}r Konzernprivilegien bei Aussch{\"{o}}pfung der Europ{\"{a}}ischen Datenschutzrichtlinie}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {343--345}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0083-1}, doi = {10.1007/S11623-011-0083-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Neumann11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Nguyen11, author = {Alexander Nguyen}, title = {Video{\"{u}}berwachung in sensitiven Bereichen - Die Zul{\"{a}}ssigkeit der Beobachtung sensitiver Daten nach deutschem und europ{\"{a}}ischem Recht}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {715--717}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0170-3}, doi = {10.1007/S11623-011-0170-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Nguyen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Onstein11, author = {Jost Onstein}, title = {Diskussionspapier des BfDI f{\"{u}}r eine Konzeption der Stiftung Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {234}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0058-2}, doi = {10.1007/S11623-011-0058-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Onstein11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Paulus11, author = {Sachar Paulus}, title = {Standards f{\"{u}}r Trusted Clouds - Anforderungen an Standards und aktuelle Entwicklungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {317--321}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0078-y}, doi = {10.1007/S11623-011-0078-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Paulus11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/PetersenP11, author = {Dominique Petersen and Norbert Pohlmann}, title = {Ideales Internet-Fr{\"{u}}hwarnsystem}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {241--246}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0060-8}, doi = {10.1007/S11623-011-0060-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/PetersenP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Petri11, author = {Thomas Petri}, title = {Die Richtlinie 2006/24/EG zur Vorratsspeicherung von Telekommunikationsverkehrsdaten - Ein Problem des europ{\"{a}}ischen Grundrechtsschutzes}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {607--610}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0148-1}, doi = {10.1007/S11623-011-0148-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Petri11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Pocs11, author = {Matthias Pocs}, title = {Gestaltung von Fahndungsdateien - Verfassungsvertr{\"{a}}glichkeit biometrischer Systeme}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {163--168}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0043-9}, doi = {10.1007/S11623-011-0043-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Pocs11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RaabeL11, author = {Oliver Raabe and Mieke Lorenz}, title = {Die datenschutzrechtliche Einwilligung im Internet der Dienste - Zur Notwendigkeit qualifizierter elektronischer Signaturen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {279--284}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0068-0}, doi = {10.1007/S11623-011-0068-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RaabeL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RaabeLPWM11, author = {Oliver Raabe and Mieke Lorenz and Frank Pallas and Eva Weis and Alfred Malina}, title = {14 Thesen zum Datenschutz im Smart Grid}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {519--523}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0130-y}, doi = {10.1007/S11623-011-0130-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RaabeLPWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rannenberg11, author = {Kai Rannenberg}, title = {{ISO/IEC} standardization of identity management and privacy technologies - Making {IT} Security and Biometrics contribute to better Identity Management and Privacy}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {27--29}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0008-z}, doi = {10.1007/S11623-011-0008-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rannenberg11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11, author = {Helmut Reimer}, title = {a-i3/BSI Symposium, Bochum, 12. / 13. April 2011}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {437}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0106-y}, doi = {10.1007/S11623-011-0106-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11a, author = {Helmut Reimer}, title = {{\"{U}}berwachung - ein Spagat?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {443}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0109-8}, doi = {10.1007/S11623-011-0109-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11b, author = {Helmut Reimer}, title = {Internet und internationale Politik}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {493}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0121-z}, doi = {10.1007/S11623-011-0121-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11c, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {578--586}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0141-8}, doi = {10.1007/S11623-011-0141-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11d, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {666--674}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0160-5}, doi = {10.1007/S11623-011-0160-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11e, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {741--748}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0176-x}, doi = {10.1007/S11623-011-0176-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11f, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {825--830}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0193-9}, doi = {10.1007/S11623-011-0193-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Reimer11g, author = {Helmut Reimer}, title = {Report}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {906--913}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0212-x}, doi = {10.1007/S11623-011-0212-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Reimer11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ReimerW11, author = {Helmut Reimer and Christoph Wegener}, title = {{IT} Compliance und Governance: Cloud Computing erweitert den Horizont}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {363}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0088-9}, doi = {10.1007/S11623-011-0088-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ReimerW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Renner11, author = {Stephan Renner}, title = {Smart Metering und Datenschutz in {\"{O}}sterreich - Empfehlungen f{\"{u}}r die Einf{\"{u}}hrung intelligenter Messger{\"{a}}te}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {524--529}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0131-x}, doi = {10.1007/S11623-011-0131-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Renner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11, author = {Karl Rihaczek}, title = {Das Navi}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {5}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0002-5}, doi = {10.1007/S11623-011-0002-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11a, author = {Karl Rihaczek}, title = {Nur nicht Auffallen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {81}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0022-1}, doi = {10.1007/S11623-011-0022-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11b, author = {Karl Rihaczek}, title = {Cloud in den Wolken}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {233}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0057-3}, doi = {10.1007/S11623-011-0057-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11c, author = {Karl Rihaczek}, title = {Soll und 1st}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {309}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0075-1}, doi = {10.1007/S11623-011-0075-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11d, author = {Karl Rihaczek}, title = {Sozial Gegenl{\"{a}}ufiges}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {385}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0094-y}, doi = {10.1007/S11623-011-0094-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11e, author = {Karl Rihaczek}, title = {Vision Car2X}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {445}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0110-2}, doi = {10.1007/S11623-011-0110-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11f, author = {Karl Rihaczek}, title = {Standards}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {8}, pages = {517}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0128-5}, doi = {10.1007/S11623-011-0128-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11g, author = {Karl Rihaczek}, title = {Otto}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {593}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0143-6}, doi = {10.1007/S11623-011-0143-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11h, author = {Karl Rihaczek}, title = {Alte Deiche}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {681}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0162-3}, doi = {10.1007/S11623-011-0162-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rihaczek11i, author = {Karl Rihaczek}, title = {Korpuskeln und das Ganze}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {839}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0197-5}, doi = {10.1007/S11623-011-0197-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rihaczek11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rose11, author = {Edgar Rose}, title = {Betriebsvereinbarung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {136}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0034-x}, doi = {10.1007/S11623-011-0034-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rose11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RossnagelDH11, author = {Alexander Ro{\ss}nagel and Monika Desoi and Gerrit Hornung}, title = {Gestufte Kontrolle bei Video{\"{u}}berwachungsanlagen - Ein Drei-Stufen-Modell als Vorschlag zur grundrechts schonenden Gestaltung}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {694--701}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0166-z}, doi = {10.1007/S11623-011-0166-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RossnagelDH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rost11, author = {Martin Rost}, title = {Datenschutz in 3D - Daten, Prozesse und Schutzziele in einem Modell}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {351--354}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0085-z}, doi = {10.1007/S11623-011-0085-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rost11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/RostB11, author = {Martin Rost and Kirsten Bock}, title = {Privacy By Design und die Neuen Schutzziele - Grunds{\"{a}}tze, Ziele und Anforderungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {30--35}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0009-y}, doi = {10.1007/S11623-011-0009-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/RostB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Roth11, author = {J{\"{u}}rgen Roth}, title = {Zukunft der Informationsfreiheit - Symposium des Bundesbeauftragten f{\"{u}}r den Datenschutz und die Informationsfreiheit am 8. und 9. Juni 2011 in Berlin}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {594}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0144-5}, doi = {10.1007/S11623-011-0144-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Roth11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Rumpel11, author = {Rainer Rumpel}, title = {Planung und Betrieb von Informationssicherheits-Managementsystemen - Erfahrungen aus der Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {12--15}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0005-2}, doi = {10.1007/S11623-011-0005-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Rumpel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schaar11, author = {Peter Schaar}, title = {Datenschutz muss mit einer Stimme sprechen!}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {756}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0180-1}, doi = {10.1007/S11623-011-0180-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schaar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schafer11, author = {Burkhard Schafer}, title = {All changed, changed utterly? - Privacy protection in post-Labour Britain}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {634--638}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0153-4}, doi = {10.1007/S11623-011-0153-4}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schafer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchildT11, author = {Hans{-}Hermann Schild and Marie{-}Theres Tinnefeld}, title = {Datenverarbeitung im internationalen Konzern - Eine Betrachtung im Lichte des Einsatzes von {SAP}}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {629--633}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0152-5}, doi = {10.1007/S11623-011-0152-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchildT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SchmidtJ11, author = {Bernd Schmidt and Christian Jakob}, title = {Die Zul{\"{a}}ssigkeit IT-gest{\"{u}}tzter Compliance- und Risikomanagementsysteme nach der BDSG-Novelle}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {88--93}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0026-x}, doi = {10.1007/S11623-011-0026-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/SchmidtJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schnabel11, author = {Christoph Schnabel}, title = {Die polizeiliche Video{\"{u}}berwachung {\"{o}}ffentlicher Orte in Niedersachen - Anmerkung zu {VG} Hannover, Urteil vom 14.7.2011, 10 {A} 5452/10 (in diesem Heft)}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {879--881}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0206-8}, doi = {10.1007/S11623-011-0206-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schnabel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schuler11, author = {Karin Schuler}, title = {Gesetz zum Besch{\"{a}}ftigtendatenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {126--128}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0032-z}, doi = {10.1007/S11623-011-0032-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schuler11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Schulz11, author = {S{\"{o}}nke E. Schulz}, title = {Datenschutz beim E-Postbrief}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {263--267}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0064-4}, doi = {10.1007/S11623-011-0064-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Schulz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Seifert11, author = {Bernd Seifert}, title = {Video{\"{u}}berwachung im k{\"{u}}nftigen Besch{\"{a}}ftigtendatenschutzrecht - Was bleibt, was geht, was kommt?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {98--109}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0028-8}, doi = {10.1007/S11623-011-0028-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Seifert11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/SlamanigR11, author = {Daniel Slamanig and Stefan Rass}, title = {Redigierbare Digitale Signaturen - Theorie und Praxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {757--762}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0181-0}, doi = {10.1007/S11623-011-0181-0}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/SlamanigR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Streinz11, author = {Rudolf Streinz}, title = {Die Rechtsprechung des EuGH zum Datenschutz}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {602--606}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0147-2}, doi = {10.1007/S11623-011-0147-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Streinz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tauber11, author = {Arne Tauber}, title = {Elektronische Zustellung in Europa - Perspektiven eines grenz{\"{u}}berschreitenden Einschreibens}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {774--778}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0184-x}, doi = {10.1007/S11623-011-0184-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tauber11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tillenburg11, author = {Gereon Tillenburg}, title = {Stimmt die Stimme? - Biometriel{\"{o}}sungen im Einsatz}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {197--199}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0049-3}, doi = {10.1007/S11623-011-0049-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tillenburg11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tinnefeld11, author = {Marie{-}Theres Tinnefeld}, title = {Privatheit als Voraussetzung menschenrechtlicher Freir{\"{a}}ume?}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {598--601}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0146-3}, doi = {10.1007/S11623-011-0146-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tinnefeld11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB11, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {Vom {\"{u}}berleben des Menschenrechts auf Privatheit in der digitalen Revolution}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {591}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0142-7}, doi = {10.1007/S11623-011-0142-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldB11a, author = {Marie{-}Theres Tinnefeld and Benedikt Buchner}, title = {The European Union {(EU)} after the Treaty of Lisbon}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {9}, pages = {657}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0158-z}, doi = {10.1007/S11623-011-0158-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldB11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/TinnefeldS11, author = {Marie{-}Theres Tinnefeld and Christoph Schnabel}, title = {Buchbesprechungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {225--226}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0054-6}, doi = {10.1007/S11623-011-0054-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/TinnefeldS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Tschersich11, author = {Thomas Tschersich}, title = {Zur Notwendigkeit eines Umdenkens beim Thema Cybersicherheit}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {408--411}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0100-4}, doi = {10.1007/S11623-011-0100-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Tschersich11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Venzke11, author = {Sven Venzke}, title = {Social Media Marketing - Eine datenschutzrechtliche Orientierungshilfe}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {387--392}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0096-9}, doi = {10.1007/S11623-011-0096-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Venzke11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WachterG11, author = {Michael W{\"{a}}chter and Joachim Gruber}, title = {Buchbesprechungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {12}, pages = {914--915}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0214-8}, doi = {10.1007/S11623-011-0214-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WachterG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wagner11, author = {Edgar Wagner}, title = {Datenschutz-Kodex f{\"{u}}r Geodatendienste und Gesetzentwurf des {BMI} zur "roten Linie" sind unzureichend!}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {2}, pages = {82}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0023-0}, doi = {10.1007/S11623-011-0023-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wagner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wegener11, author = {Christoph Wegener}, title = {Wolkige Zeiten}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {5}, pages = {307}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0074-2}, doi = {10.1007/S11623-011-0074-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wegener11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Weichert11, author = {Thilo Weichert}, title = {Datenschutz im Anti-Doping-Kampf - Zugleich Besprechung des Buches "Datenschutz im Anti-Doping-Kampf" von Lars Mortsiefer}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {10}, pages = {702--706}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0167-y}, doi = {10.1007/S11623-011-0167-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Weichert11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WeigmannDLTJ11, author = {Uwe Weigmann and Knut Deimer and Christian Leininger and Ludwig Turba and Steffen Jurran}, title = {Biometrie am {BBI} - Chancen und Randbedingungen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {3}, pages = {179--182}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0046-6}, doi = {10.1007/S11623-011-0046-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WeigmannDLTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wendt11, author = {Mario Wendt}, title = {Smart Grid - eine Herausforderung aus Sicht der Standardisierung und der IT-Sicherheit oder schon "business-as-usual"}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {22--26}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0007-0}, doi = {10.1007/S11623-011-0007-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wendt11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wieczorek11, author = {Mirko Andreas Wieczorek}, title = {Informationsbasiertes Pers{\"{o}}nlichkeitsrecht - {\"{U}}berlegungen zur Restauration des Pers{\"{o}}nlichkeitsschutzes im Internetzeitalter}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {476--481}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0118-7}, doi = {10.1007/S11623-011-0118-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wieczorek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Wiele11, author = {Johannes Wiele}, title = {Vertrauensfragen - Unternehmenssicherheit und F{\"{u}}hrungspraxis}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {471--475}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0117-8}, doi = {10.1007/S11623-011-0117-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Wiele11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Winkler11, author = {Thomas Winkler}, title = {Vertrauensw{\"{u}}rdige Video{\"{u}}berwachung - Sichere intelligente Kameras mit Trusted Computing}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {797--801}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0188-6}, doi = {10.1007/S11623-011-0188-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Winkler11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WinterLZH11, author = {Philipp Winter and Harald Lampesberger and Markus Zeilinger and Eckehard Hermann}, title = {Anomalieerkennung in Computernetzen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {4}, pages = {235--239}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0059-1}, doi = {10.1007/S11623-011-0059-1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WinterLZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/WolffB11, author = {Heinrich Amadeus Wolff and Stefan Brink}, title = {Neuregelung der Video{\"{u}}berwachung in Rheinland-Pfalz - Verfassungsrechtliche Grenzen des Einsatzes von Attrappen durch die {\"{o}}ffentliche Hand}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {7}, pages = {447--450}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0112-0}, doi = {10.1007/S11623-011-0112-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/WolffB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X11, title = {Datenschutzbeauftragte des Bundes und der L{\"{a}}nder: Entschlie{\ss}ungen der 80. Konferenz - 3./4. November 2010}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {1}, pages = {48--49}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0013-2}, doi = {10.1007/S11623-011-0013-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/X11a, title = {Datenschutzbeauftragte des Bundes und der L{\"{a}}nder: Entschlie{\ss}ungen der 82. Konferenz vom 28./29. September 2011 in M{\"{u}}nchen}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {812--815}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0191-y}, doi = {10.1007/S11623-011-0191-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/X11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/ZeffererTL11, author = {Thomas Zefferer and Peter Teufl and Herbert Leitold}, title = {Mobile qualifizierte Signaturen in Europa - Konzepte zur Vereinfachung elektronischer Signaturen durch die Verwendung mobiler Endger{\"{a}}te}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {11}, pages = {768--773}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0183-y}, doi = {10.1007/S11623-011-0183-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/ZeffererTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Zoebisch11, author = {Michael Zoebisch}, title = {Stimmungsanalyse durch Call-Center - Datenschutzrechtliche Zul{\"{a}}ssigkeit der Analyse der emotionalen Verfassung anhand der Stimme}, journal = {Datenschutz und Datensicherheit}, volume = {35}, number = {6}, pages = {394--397}, year = {2011}, url = {https://doi.org/10.1007/s11623-011-0097-8}, doi = {10.1007/S11623-011-0097-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dud/Zoebisch11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.