{"title":"Schwachstellen der Informationssicherheit in lokalen Netzen","authors":"F. Kauffels","doi":"10.1007/978-3-642-70865-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_5","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenschutz in der Informationsgesellschaft","authors":"E. Fuchs","doi":"10.1007/978-3-642-70865-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_16","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"128 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymität von Individualdaten in statistischen Datenbanken","authors":"Gerhard Paass","doi":"10.1007/978-3-642-70865-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_12","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125782022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Betrugssicherheit trotz Anonymität, Abrechnung und Geldtransfer in Netzen","authors":"M. Waidner, A. Pfitzmann","doi":"10.1007/978-3-642-70865-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_10","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verfahrensregelungen und Selbstregulierung der spreichernden Stelle - rechtliche Lösungsmöglichkeiten von Datenschutz-problemen?","authors":"B. Ziegler-Jung","doi":"10.1007/978-3-642-70865-7_20","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_20","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unterstützung von Datenschutz und Datensicherung durch Prüfung von Software auf Nonkonformität","authors":"F. Krückeberg","doi":"10.1007/978-3-642-70865-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_14","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vertrauenwürdige DV-Systeme, das Bewertungsverfahren des US-Verteidigungsministeriums","authors":"Dietrich Cerny","doi":"10.1007/978-3-642-70865-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_13","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hat die Datenverarbeitung das Datenschutzrecht überholt? Überlegunen aus der Sicht der Kontrollpraxis","authors":"Franz-Joachim Kerkau","doi":"10.1007/978-3-642-70865-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_7","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1. GI-Fachtagung, München, 30. und 31. Oktober 1985, Proceedings","authors":"GI-Fachtagung, P. Spies","doi":"10.1007/978-3-642-70865-7","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenmissbrauch: Verhindern besser als verbieten","authors":"K. Rihaczek","doi":"10.1007/978-3-642-70865-7_18","DOIUrl":"https://doi.org/10.1007/978-3-642-70865-7_18","url":null,"abstract":"","PeriodicalId":299798,"journal":{"name":"Datenschutz und Datensicherung","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116057958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}