{"title":"Untersuchung der Datenschutzeigenschaften von Ringzugriffsmechanismen","authors":"Günter Höckel, A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_9","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"5 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specification and Realization of Protection Problems as Applied to the Erlangen Cancer Registry","authors":"R. Gotzhein, L. Horbach","doi":"10.1007/978-3-642-70865-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_11","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technischer Datenschutz in dienstintegrierenden Digitalnetzen - Problemanalyse, Lösungsansätze und eine angepasste Systemstruktur","authors":"A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_8","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenschutz und Datensicherng im Wandel der Informationstechnologie","authors":"P. Spies","doi":"10.1007/978-3-642-70865-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_1","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modellierung und Implementation sicherer Bürosysteme","authors":"Franz-Peter Heider","doi":"10.1007/978-3-642-70865-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_6","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chip-Karten: Realisierungs- und Anwendungsmöglichkeiten","authors":"J. Weimann","doi":"10.1007/978-3-642-70865-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_2","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132211328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Secret Codes can Prevent a Computerized Big Brother","authors":"D. Chaum","doi":"10.1007/978-3-642-70865-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_3","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technische Entwicklung und Datenschutzrecht","authors":"Hans-Jürgen Leib","doi":"10.1007/978-3-642-70865-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_17","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticity Anonymity and Security in OSIS - an open System for Information Services","authors":"S. Herda","doi":"10.1007/978-3-642-70865-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_4","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}