172 lines
8.3 KiB
BibTeX
172 lines
8.3 KiB
BibTeX
@book{boonkrong2021,
|
||
title = {Authentication and {{Access Control}}: {{Practical Cryptography Methods}} and {{Tools}}},
|
||
shorttitle = {Authentication and {{Access Control}}},
|
||
author = {Boonkrong, Sirapat},
|
||
year = {2021},
|
||
publisher = {Apress},
|
||
address = {Berkeley, CA},
|
||
doi = {10.1007/978-1-4842-6570-3},
|
||
urldate = {2025-05-29},
|
||
copyright = {http://www.springer.com/tdm},
|
||
isbn = {978-1-4842-6570-3},
|
||
langid = {english},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\GUDGV4NS\Boonkrong - 2021 - Authentication and Access Control Practical Cryptography Methods and Tools.pdf}
|
||
}
|
||
|
||
@book{bub2015,
|
||
title = {{Sicherheit im Wandel von Technologien und M{\"a}rkten}},
|
||
editor = {Bub, Udo and Deleski, Viktor and Wolfenstetter, Klaus-Dieter},
|
||
year = {2015},
|
||
publisher = {Springer Fachmedien Wiesbaden},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-11274-5},
|
||
urldate = {2025-07-07},
|
||
copyright = {http://www.springer.com/tdm},
|
||
isbn = {978-3-658-11273-8 978-3-658-11274-5},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\PTHW773Q\Bub et al. - 2015 - Sicherheit im Wandel von Technologien und Märkten.pdf}
|
||
}
|
||
|
||
@book{eichstaedt2024,
|
||
title = {{52 Stunden Informatik: Was jeder {\"u}ber Informatik wissen sollte}},
|
||
shorttitle = {{52 Stunden Informatik}},
|
||
author = {Eichst{\"a}dt, Timm and Spieker, Stefan},
|
||
year = {2024},
|
||
publisher = {Springer Fachmedien Wiesbaden},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-41838-0},
|
||
urldate = {2025-07-07},
|
||
copyright = {https://www.springernature.com/gp/researchers/text-and-data-mining},
|
||
isbn = {978-3-658-41838-0},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\E455ZNKU\Eichstädt und Spieker - 2024 - 52 Stunden Informatik Was jeder über Informatik wissen sollte.pdf}
|
||
}
|
||
|
||
@book{garbis2024,
|
||
title = {{Zero Trust Sicherheit: Ein Leitfaden f{\"u}r Unternehmen}},
|
||
shorttitle = {{Zero Trust Sicherheit}},
|
||
author = {Garbis, Jason and Chapman, Jerry W.},
|
||
year = {2024},
|
||
publisher = {Apress},
|
||
address = {Berkeley, CA},
|
||
doi = {10.1007/979-8-8688-0105-1},
|
||
urldate = {2025-07-07},
|
||
copyright = {https://www.springernature.com/gp/researchers/text-and-data-mining},
|
||
isbn = {979-8-8688-0105-1},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\8DG9NI4S\Garbis und Chapman - 2024 - Zero Trust Sicherheit Ein Leitfaden für Unternehmen.pdf}
|
||
}
|
||
|
||
@book{kaufmann2023,
|
||
title = {{Grundkurs Wirtschaftsinformatik: Eine kompakte und praxisorientierte Einf{\"u}hrung}},
|
||
shorttitle = {{Grundkurs Wirtschaftsinformatik}},
|
||
author = {Kaufmann, Jens and M{\"u}lder, Wilhelm},
|
||
year = {2023},
|
||
publisher = {Springer Fachmedien},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-37937-7},
|
||
urldate = {2024-03-18},
|
||
isbn = {978-3-658-37937-7},
|
||
langid = {ngerman},
|
||
keywords = {Betriebliche Informationssysteme,Datenbanken,E-Business,Enterprise Resource Planning,ERP-Systeme,Grundlagen der Wirtschaftsinformatik,Informationsmanagement,IT-Grundlagen,IT-Sicherheit,M-Business,Mobile Business,Rechnersysteme,Social Media,Softwareentwicklung,Vorhanden,Wirtschaftsinformatik Buch},
|
||
file = {C:\Users\Dominik\Zotero\storage\YFPL5WWR\Kaufmann und Mülder - 2023 - Grundkurs Wirtschaftsinformatik Eine kompakte und.pdf}
|
||
}
|
||
|
||
@book{kebschull2023,
|
||
title = {{Computer Hacking: Eine Einf{\"u}hrung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen}},
|
||
shorttitle = {{Computer Hacking}},
|
||
author = {Kebschull, Udo},
|
||
year = {2023},
|
||
edition = {1.},
|
||
publisher = {Springer Berlin Heidelberg},
|
||
address = {Berlin, Heidelberg},
|
||
urldate = {2025-01-10},
|
||
isbn = {978-3-662-67030-9},
|
||
langid = {german},
|
||
keywords = {Risk management; Computer networks; Data protection; Computer crimes; Lehrbuch; Hacker; Computersicherheit; Datensicherung; Softwareschwachstelle; Penetrationstest; Softwarewerkzeug,Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\97CIRM6Z\Kebschull - 2023 - Computer Hacking Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastruk.pdf}
|
||
}
|
||
|
||
@phdthesis{kruse2020,
|
||
type = {{Masterarbeit}},
|
||
title = {{Biometriebasierte Authentifizierung mit WebAuthn}},
|
||
author = {Kruse, Malte},
|
||
year = {2020},
|
||
address = {Berlin},
|
||
urldate = {2025-06-18},
|
||
langid = {ngerman},
|
||
school = {Humboldt-Universit{\"a}t zu Berlin},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\Y8MJYGT8\SAR-PR-2020-02_.pdf}
|
||
}
|
||
|
||
@article{ometov2018,
|
||
title = {Multi-{{Factor Authentication}}: {{A Survey}}},
|
||
shorttitle = {Multi-{{Factor Authentication}}},
|
||
author = {Ometov, Aleksandr and Bezzateev, Sergey and M{\"a}kitalo, Niko and Andreev, Sergey and Mikkonen, Tommi and Koucheryavy, Yevgeni},
|
||
year = {2018},
|
||
month = jan,
|
||
journal = {Cryptography},
|
||
volume = {2},
|
||
number = {1},
|
||
pages = {1},
|
||
issn = {2410-387X},
|
||
doi = {10.3390/cryptography2010001},
|
||
urldate = {2025-05-29},
|
||
abstract = {Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir's Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.},
|
||
copyright = {https://creativecommons.org/licenses/by/4.0/},
|
||
langid = {english},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\YMC3ZV3I\Ometov et al. - 2018 - Multi-Factor Authentication A Survey.pdf}
|
||
}
|
||
|
||
@book{pufahl2024,
|
||
title = {{Cybersecurity f{\"u}r Manager: Cybergefahren wirksam begegnen -- das Kompetenzmodell f{\"u}r die Praxis}},
|
||
shorttitle = {{Cybersecurity f{\"u}r Manager}},
|
||
author = {Pufahl, Mario and Paulsen, Patrick and Arndt, Paul},
|
||
year = {2024},
|
||
publisher = {Springer Fachmedien Wiesbaden},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-44892-9},
|
||
urldate = {2025-01-19},
|
||
copyright = {https://www.springernature.com/gp/researchers/text-and-data-mining},
|
||
isbn = {978-3-658-44892-9},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\JHXGLIBP\Pufahl et al. - 2024 - Cybersecurity für Manager Cybergefahren wirksam begegnen – das Kompetenzmodell für die Praxis.pdf}
|
||
}
|
||
|
||
@book{trojahn2016,
|
||
title = {{Sichere Multi-Faktor-Authentifizierung an Smartphones mithilfe des Tippverhaltens}},
|
||
author = {Trojahn, Matthias},
|
||
year = {2016},
|
||
publisher = {Springer Fachmedien Wiesbaden},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-14049-6},
|
||
urldate = {2025-07-07},
|
||
copyright = {http://www.springer.com/tdm},
|
||
isbn = {978-3-658-14049-6},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\DBHDRUEU\Trojahn - 2016 - Sichere Multi-Faktor-Authentifizierung an Smartphones mithilfe des Tippverhaltens.pdf}
|
||
}
|
||
|
||
@book{tsolkas2017,
|
||
title = {{Rollen und Berechtigungskonzepte}},
|
||
author = {Tsolkas, Alexander and Schmidt, Klaus},
|
||
year = {2017},
|
||
publisher = {Springer Fachmedien Wiesbaden},
|
||
address = {Wiesbaden},
|
||
doi = {10.1007/978-3-658-17987-8},
|
||
urldate = {2025-05-29},
|
||
copyright = {http://www.springer.com/tdm},
|
||
isbn = {978-3-658-17987-8},
|
||
langid = {ngerman},
|
||
keywords = {Vorhanden},
|
||
file = {C:\Users\Dominik\Zotero\storage\ND6EMKH4\Tsolkas und Schmidt - 2017 - Rollen und Berechtigungskonzepte.pdf}
|
||
}
|