Datenschutz und Datensicherung最新文献

筛选
英文 中文
Schwachstellen der Informationssicherheit in lokalen Netzen 本地网络的信息安全弱点
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_5
F. Kauffels
{"title":"Schwachstellen der Informationssicherheit in lokalen Netzen","authors":"F. Kauffels","doi":"10.1007/978-3-642-70865-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_5","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Datenschutz in der Informationsgesellschaft 信息社会的数据保护
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_16
E. Fuchs
{"title":"Datenschutz in der Informationsgesellschaft","authors":"E. Fuchs","doi":"10.1007/978-3-642-70865-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_16","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"128 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Anonymität von Individualdaten in statistischen Datenbanken 个体数据在统计数据库里匿名
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_12
Gerhard Paass
{"title":"Anonymität von Individualdaten in statistischen Datenbanken","authors":"Gerhard Paass","doi":"10.1007/978-3-642-70865-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_12","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125782022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen 远离匿名,支付,转账
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_10
M. Waidner, A. Pfitzmann
{"title":"Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen","authors":"M. Waidner, A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_10","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Verfahrensregelungen und Selbstregulierung der spreichernden Stelle - rechtliche Lösungsmöglichkeiten von Datenschutz-problemen? 如何应对隐私问题?
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_20
B. Ziegler-Jung
{"title":"Verfahrensregelungen und Selbstregulierung der spreichernden Stelle - rechtliche Lösungsmöglichkeiten von Datenschutz-problemen?","authors":"B. Ziegler-Jung","doi":"10.1007/978-3-642-70865-7_20","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_20","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unterstützung von Datenschutz und Datensicherung durch Prüfung von Software auf Nonkonformität 其他方法
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_14
F. Krückeberg
{"title":"Unterstützung von Datenschutz und Datensicherung durch Prüfung von Software auf Nonkonformität","authors":"F. Krückeberg","doi":"10.1007/978-3-642-70865-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_14","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vertrauenwürdige DV-Systeme, das Bewertungsverfahren des US-Verteidigungsministeriums 信任dv系统美国国防部评估系统
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_13
Dietrich Cerny
{"title":"Vertrauenwürdige DV-Systeme, das Bewertungsverfahren des US-Verteidigungsministeriums","authors":"Dietrich Cerny","doi":"10.1007/978-3-642-70865-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_13","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hat die Datenverarbeitung das Datenschutzrecht überholt? Überlegunen aus der Sicht der Kontrollpraxis 数据处理有过修订吗取而代之的控制实践
Datenschutz und Datensicherung Pub Date : 1985-10-30 DOI: 10.1007/978-3-642-70865-7_7
Franz-Joachim Kerkau
{"title":"Hat die Datenverarbeitung das Datenschutzrecht überholt? Überlegunen aus der Sicht der Kontrollpraxis","authors":"Franz-Joachim Kerkau","doi":"10.1007/978-3-642-70865-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_7","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1. GI-Fachtagung, München, 30. und 31. Oktober 1985, Proceedings 保密和信息技术的变革吉展,慕尼黑,30号和31 .谢谢
Datenschutz und Datensicherung Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-70865-7
GI-Fachtagung, P. Spies
{"title":"Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1. GI-Fachtagung, München, 30. und 31. Oktober 1985, Proceedings","authors":"GI-Fachtagung, P. Spies","doi":"10.1007/978-3-642-70865-7","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Datenmissbrauch: Verhindern besser als verbieten 数据滥用:做好预防工作
Datenschutz und Datensicherung Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-70865-7_18
K. Rihaczek
{"title":"Datenmissbrauch: Verhindern besser als verbieten","authors":"K. Rihaczek","doi":"10.1007/978-3-642-70865-7_18","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_18","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信