Please use this identifier to cite or link to this item:
https://irek.ase.md:443/xmlui/handle/123456789/4695Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Belinschi, Ghenadie | - |
| dc.date.accessioned | 2025-11-17T11:38:18Z | - |
| dc.date.available | 2025-11-17T11:38:18Z | - |
| dc.date.issued | 2025-05 | - |
| dc.identifier.isbn | 978-9975-168-48-9 (PDF) | - |
| dc.identifier.uri | https://irek.ase.md:443/xmlui/handle/123456789/4695 | - |
| dc.description | BELINSCHI, Ghenadie. Adaptive Multi-Factor Authentication in a Document-Centric System. Online. In: Technological Innovations in Digital Security: Proceedings of the First Edition of the International Conference, Chişinău, May 15-16, 2025. Chişinău: SEP ASEM, 2025, pp. 75-82. ISBN 978-9975-168-48-9 (PDF). Disponibil: https://doi.org/10.53486/tids2025.09 | en_US |
| dc.description.abstract | Static authentication methods are increasingly vulnerable to social engineering and phishing, especially in cloud-based document workflows. This paper presents an adaptive multi-factor authentication model that escalates security measures with higher document criticality or anomalous user behavior. By merging biometric data with cryptographic safeguards under Zero-Trust principles, continuous verification is achieved while balancing usability. Preliminary findings suggest a notable increase in protection for sensitive documents and underscore the need to standardize event-driven controls. UDC: 004.056.523; JEL: C 88, O 33, M 15. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | SEP ASEM | en_US |
| dc.subject | multi-factor authentication | en_US |
| dc.subject | document-centric systems | en_US |
| dc.subject | data protection | en_US |
| dc.title | Adaptive Multi-Factor Authentication in a Document-Centric System | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | 2.Articole | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| TEHNOLOGICAL INNOVATIONS IN DIGITAL SECURITY_pp75-82.pdf | 420.22 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.