Datenschutz und Datensicherung最新文献

筛选
英文 中文
Untersuchung der Datenschutzeigenschaften von Ringzugriffsmechanismen 隐私搜索机构的隐私
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_9
Günter Höckel, A. Pfitzmann
{"title":"Untersuchung der Datenschutzeigenschaften von Ringzugriffsmechanismen","authors":"Günter Höckel, A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_9","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"5 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Soziale Beherrschbarkeit offener Netze 社会可控制
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_19
W. Steinmüller
{"title":"Soziale Beherrschbarkeit offener Netze","authors":"W. Steinmüller","doi":"10.1007/978-3-642-70865-7_19","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_19","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122653061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Specification and Realization of Protection Problems as Applied to the Erlangen Cancer Registry 应用于Erlangen癌症登记的保护问题的规范和实现
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_11
R. Gotzhein, L. Horbach
{"title":"Specification and Realization of Protection Problems as Applied to the Erlangen Cancer Registry","authors":"R. Gotzhein, L. Horbach","doi":"10.1007/978-3-642-70865-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_11","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technischer Datenschutz in dienstintegrierenden Digitalnetzen - Problemanalyse, Lösungsansätze und eine angepasste Systemstruktur 和讲话还有其他的问题
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_8
A. Pfitzmann
{"title":"Technischer Datenschutz in dienstintegrierenden Digitalnetzen - Problemanalyse, Lösungsansätze und eine angepasste Systemstruktur","authors":"A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_8","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Datenschutz und Datensicherng im Wandel der Informationstechnologie 数据保护和信息技术革命
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_1
P. Spies
{"title":"Datenschutz und Datensicherng im Wandel der Informationstechnologie","authors":"P. Spies","doi":"10.1007/978-3-642-70865-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_1","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modellierung und Implementation sicherer Bürosysteme 复活和执行安全办公系统
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_6
Franz-Peter Heider
{"title":"Modellierung und Implementation sicherer Bürosysteme","authors":"Franz-Peter Heider","doi":"10.1007/978-3-642-70865-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_6","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chip-Karten: Realisierungs- und Anwendungsmöglichkeiten 条形图:实现和应用的应用
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_2
J. Weimann
{"title":"Chip-Karten: Realisierungs- und Anwendungsmöglichkeiten","authors":"J. Weimann","doi":"10.1007/978-3-642-70865-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_2","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132211328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Secret Codes can Prevent a Computerized Big Brother 新的密码可以防止计算机化的老大哥
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_3
D. Chaum
{"title":"New Secret Codes can Prevent a Computerized Big Brother","authors":"D. Chaum","doi":"10.1007/978-3-642-70865-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_3","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125334701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technische Entwicklung und Datenschutzrecht 隐私法
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_17
Hans-Jürgen Leib
{"title":"Technische Entwicklung und Datenschutzrecht","authors":"Hans-Jürgen Leib","doi":"10.1007/978-3-642-70865-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_17","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticity Anonymity and Security in OSIS - an open System for Information Services 信息服务开放系统sis中的真实性、匿名性和安全性
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_4
S. Herda
{"title":"Authenticity Anonymity and Security in OSIS - an open System for Information Services","authors":"S. Herda","doi":"10.1007/978-3-642-70865-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_4","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信