Logo des Repositoriums
 

Authentication on Mobile Devices for Business Application

dc.contributor.authorMüller, Martina
dc.contributor.authorZoller, Fabian
dc.contributor.authorPansa, Ingo
dc.contributor.authorGerlicher, Ansgar
dc.contributor.editorHühnlein, Detlef
dc.contributor.editorRoßnagel, Heiko
dc.date.accessioned2018-10-10T08:35:32Z
dc.date.available2018-10-10T08:35:32Z
dc.date.issued2013
dc.description.abstractIdentity management faces new challenges of protecting resources that are aces from different and maybe unknown devices. This is caused by the fact that employees bring their own mobile devices to their offices and work with them [Gar12]. Consequently users, programmer and companies have to face challenges that arise from mobile authentication: the need for accessing business application is based on the employees user identity. This paper describes a methodical analysis and evaluation of the current state of the art authentication methods. The resulting evaluation is the basis for a prototypical implementation of the best evaluated authentication methods on mobile devices. To test and confirm the theoretical architectures implemented on mobile devices a usability test has been made. A conclusion sums up the lessons learned and recommendations are made.en
dc.identifier.isbn978-3-88579-617-6
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/17187
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofOpen Identity Summit 2013
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-223
dc.titleAuthentication on Mobile Devices for Business Applicationen
dc.typeText/Conference Paper
gi.citation.endPage154
gi.citation.publisherPlaceBonn
gi.citation.startPage142
gi.conference.date10.-11.09.2013
gi.conference.locationKloster Banz
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
142.pdf
Größe:
117.5 KB
Format:
Adobe Portable Document Format