Skip to main content
Top

2024 | OriginalPaper | Chapter

2. Technische Grundlagen

Authors : Matthias Janetschek, Pascal Schöttle

Published in: Digitalwirtschaft

Publisher: Springer Fachmedien Wiesbaden

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Dieses Kapitel bietet einen umfassenden Überblick über die technischen Grundlagen, die die moderne digitale Welt und die Digitalwirtschaft prägen. Es konzentriert sich auf Schlüsseltechnologien und Konzepte wie Internettechnologien, Cloud-Computing, künstliche Intelligenz, maschinelles Lernen, Blockchain und IT-Sicherheit. Die Leser:innen erhalten ein fundiertes Verständnis für die Technologien, die die digitale Landschaft prägen. Dieses Wissen dient als Grundlage für ein tieferes Verständnis der Konzepte, die in den folgenden Kapiteln diskutiert werden.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abramova, S., Schöttle, P., & Böhme, R. (2017). Mixing coins of different quality: A game-theoretic approach. In M. Brenner et al. (Hrsg.), Financial cryptography and data security (FC 2017. Lecture notes in computer science, Bd. 10323).CrossRef Abramova, S., Schöttle, P., & Böhme, R. (2017). Mixing coins of different quality: A game-theoretic approach. In M. Brenner et al. (Hrsg.), Financial cryptography and data security (FC 2017. Lecture notes in computer science, Bd. 10323).CrossRef
go back to reference Anderson, R. (2001). Why information security is hard – An economic perspective. In ACSAC ’01: Proceedings of the 17th annual computer security applications conference (S. 358–365). ACM. Anderson, R. (2001). Why information security is hard – An economic perspective. In ACSAC ’01: Proceedings of the 17th annual computer security applications conference (S. 358–365). ACM.
go back to reference Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems. Wiley. Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems. Wiley.
go back to reference Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.CrossRef Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.CrossRef
go back to reference Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts (SoK). Springer. Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts (SoK). Springer.
go back to reference Baumhauer, T., Schöttle, P., & Zeppelzauer, M. (2022). Machine unlearning: Linear filtration for logit-based classifiers. Machine Learning, 111, 3203–3226.CrossRef Baumhauer, T., Schöttle, P., & Zeppelzauer, M. (2022). Machine unlearning: Linear filtration for logit-based classifiers. Machine Learning, 111, 3203–3226.CrossRef
go back to reference Bertoncello, M., & Wee, D. (2015). Ten ways autonomous driving could redefine the automotive world. McKinsey & Company. Bertoncello, M., & Wee, D. (2015). Ten ways autonomous driving could redefine the automotive world. McKinsey & Company.
go back to reference Bishop, M. (2003). Computer security: Art and science. Addison-Wesley. Bishop, M. (2003). Computer security: Art and science. Addison-Wesley.
go back to reference Böhme, R., & Moore, T. (2009). The iterated weakest link: A model of adaptive security investment (Bd. 9). WEIS. Böhme, R., & Moore, T. (2009). The iterated weakest link: A model of adaptive security investment (Bd. 9). WEIS.
go back to reference Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213–238.CrossRef Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, technology, and governance. Journal of economic Perspectives, 29(2), 213–238.CrossRef
go back to reference Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press. Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford University Press.
go back to reference Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W. W. Norton & Company. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W. W. Norton & Company.
go back to reference Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform. White paper (Ethereum Foundation). Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform. White paper (Ethereum Foundation).
go back to reference Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press. Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press.
go back to reference Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.CrossRef Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.CrossRef
go back to reference Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access. Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access.
go back to reference Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311–313.CrossRef Crawford, K., & Calo, R. (2016). There is a blind spot in AI research. Nature, 538(7625), 311–313.CrossRef
go back to reference Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.CrossRef Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.CrossRef
go back to reference Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.CrossRef
go back to reference Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78–87.CrossRef Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78–87.CrossRef
go back to reference Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint, arXiv, 1702.08608. Doshi-Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint, arXiv, 1702.08608.
go back to reference Eskandari, S., Salehi, M., Gu, W. C., & Clark, J. (2021). SoK: Oracles from the ground truth to market manipulation, ACM. Eskandari, S., Salehi, M., Gu, W. C., & Clark, J. (2021). SoK: Oracles from the ground truth to market manipulation, ACM.
go back to reference Esteva, A., Robicquet, A., Ramsundar, B., Kuleshov, V., DePristo, M., Chou, K., Cui, C., Corrado, G., Thrun, S., & Dean, J. (2019). A guide to deep learning in healthcare. Nature Medicine, 25(1), 24–29.CrossRef Esteva, A., Robicquet, A., Ramsundar, B., Kuleshov, V., DePristo, M., Chou, K., Cui, C., Corrado, G., Thrun, S., & Dean, J. (2019). A guide to deep learning in healthcare. Nature Medicine, 25(1), 24–29.CrossRef
go back to reference Gollmann, D. (2011). Computer security. Wiley. Gollmann, D. (2011). Computer security. Wiley.
go back to reference Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press. Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
go back to reference Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.CrossRef
go back to reference Gumm, H. P., Sommer, M., Hesse, W., Seeger, B., & Taentzer, G. (2013). Einfuhrung in die Informatik. Oldenbourg Wissenschaftsverlag Verlag.CrossRef Gumm, H. P., Sommer, M., Hesse, W., Seeger, B., & Taentzer, G. (2013). Einfuhrung in die Informatik. Oldenbourg Wissenschaftsverlag Verlag.CrossRef
go back to reference Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography (Springer Professional Computing). Springer. Hankerson, D., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography (Springer Professional Computing). Springer.
go back to reference Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning. Springer. Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning. Springer.
go back to reference Herold, H., Lurz, B., Wohlrab, J., & Hopf, M. (2012). Grundlagen der Informatik (3., akt. Aufl.). Pearson Studium München. Herold, H., Lurz, B., Wohlrab, J., & Hopf, M. (2012). Grundlagen der Informatik (3., akt. Aufl.). Pearson Studium München.
go back to reference Howard, J. D., & Longstaff, T. A. (1998). A common language for computer security incidents. Sandia Report. Howard, J. D., & Longstaff, T. A. (1998). A common language for computer security incidents. Sandia Report.
go back to reference Hutter, F., Kotthoff, L., & Vanschoren, J. (2019). Automated machine learning: Methods, systems, challenges. Springer.CrossRef Hutter, F., Kotthoff, L., & Vanschoren, J. (2019). Automated machine learning: Methods, systems, challenges. Springer.CrossRef
go back to reference King, S., & Nadal, S. (2012). PPCoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper. King, S., & Nadal, S. (2012). PPCoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper.
go back to reference Kurose, J., & Ross, K. (2014): Computernetzwerke (6., akt. Aufl.). Pearson Studium München. Kurose, J., & Ross, K. (2014): Computernetzwerke (6., akt. Aufl.). Pearson Studium München.
go back to reference LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278–2324.CrossRef LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278–2324.CrossRef
go back to reference Luckin, R., Holmes, W., Griffiths, M., & Forcier, L. B. (2016). Intelligence unleashed. An argument for AI in Education. Pearson. Luckin, R., Holmes, W., Griffiths, M., & Forcier, L. B. (2016). Intelligence unleashed. An argument for AI in Education. Pearson.
go back to reference Mee, V., Tryfonas, T., & Sfakianakis, A. (2014). Understanding the challenges of cyber forensics investigations: A survey of U.K. Law Enforcement Agencies. Journal of Forensic Sciences, 59(4), 875–882. Mee, V., Tryfonas, T., & Sfakianakis, A. (2014). Understanding the challenges of cyber forensics investigations: A survey of U.K. Law Enforcement Agencies. Journal of Forensic Sciences, 59(4), 875–882.
go back to reference Mell, P., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing (Technical Report). National Institute of Standards & Technology. Mell, P., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing (Technical Report). National Institute of Standards & Technology.
go back to reference Menzel, M., Tran, V. T., Eitel, A., Domingues, S., & Ott, I. (2018) State of the art in distributed ledger technology research in business and economics: A content-analysis approach. Journal of Business Economics. Menzel, M., Tran, V. T., Eitel, A., Domingues, S., & Ott, I. (2018) State of the art in distributed ledger technology research in business and economics: A content-analysis approach. Journal of Business Economics.
go back to reference Mirkovic, J., & Reiher, P. (2011). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53.CrossRef Mirkovic, J., & Reiher, P. (2011). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53.CrossRef
go back to reference Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. The Journal of Economic Perspectives, 23(3), 3–20.CrossRef Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. The Journal of Economic Perspectives, 23(3), 3–20.CrossRef
go back to reference Möser, M., Böhme, R., & Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit (S. 1–14). IEEE. Möser, M., Böhme, R., & Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit (S. 1–14). IEEE.
go back to reference Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next internet technology. Wiley. Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next internet technology. Wiley.
go back to reference Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Whitepaper. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Whitepaper.
go back to reference Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press. Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.
go back to reference NIST. (2013). Digital Signature Standard (DSS) (FIPS PUB 186-4). Federal Information Processing Standards Publication. NIST. (2013). Digital Signature Standard (DSS) (FIPS PUB 186-4). Federal Information Processing Standards Publication.
go back to reference Pfleeger, C. P., & Pfleeger, S. L. (2011). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall. Pfleeger, C. P., & Pfleeger, S. L. (2011). Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall.
go back to reference Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2007). Aspects of insider threats. Insider Threats in Cyber Security, (S. 15–36). Springer. Probst, C. W., Hunker, J., Gollmann, D., & Bishop, M. (2007). Aspects of insider threats. Insider Threats in Cyber Security, (S. 15–36). Springer.
go back to reference Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, RFC Editor. Internet Engineering Task Force (IETF). Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, RFC Editor. Internet Engineering Task Force (IETF).
go back to reference Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRef Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRef
go back to reference Rosenfeld, M. (2011). Overview of colored coins. White Paper. Rosenfeld, M. (2011). Overview of colored coins. White Paper.
go back to reference Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning representations by back-propagating errors. Nature, 323, 533–536.CrossRef Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning representations by back-propagating errors. Nature, 323, 533–536.CrossRef
go back to reference Russell, S., & Norvig, P. (2016). Artificial intelligence: A modern approach. Pearson. Russell, S., & Norvig, P. (2016). Artificial intelligence: A modern approach. Pearson.
go back to reference Samsinger, M., Merkle, F., Schöttle, P., & Pevny, T. (2021). When should you defend your classifier? In B. Bošanský, C. Gonzalez, S. Rass, & A. Sinha (Hrsg.), Decision and game theory for security (GameSec 2021. Lecture notes in computer science, Bd. 13061). Springer.CrossRef Samsinger, M., Merkle, F., Schöttle, P., & Pevny, T. (2021). When should you defend your classifier? In B. Bošanský, C. Gonzalez, S. Rass, & A. Sinha (Hrsg.), Decision and game theory for security (GameSec 2021. Lecture notes in computer science, Bd. 13061). Springer.CrossRef
go back to reference Samuel, A. (1959). Some studies in machine learning using the game of checkers. IBM Journal of Research and Development. Samuel, A. (1959). Some studies in machine learning using the game of checkers. IBM Journal of Research and Development.
go back to reference Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. Wiley. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. Wiley.
go back to reference Schneier, B. (2008). Attack trees. In Schneier on security. Wiley. Schneier, B. (2008). Attack trees. In Schneier on security. Wiley.
go back to reference Schwartz, D., Youngs, N., & Britto, A. (2014). The ripple protocol consensus algorithm. White Paper. Schwartz, D., Youngs, N., & Britto, A. (2014). The ripple protocol consensus algorithm. White Paper.
go back to reference Searle, J. (1980). Minds, brains, and programs. Behavioral and Brain Sciences. Searle, J. (1980). Minds, brains, and programs. Behavioral and Brain Sciences.
go back to reference Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Pearson. Stallings, W., & Brown, L. (2012). Computer security: Principles and practice. Pearson.
go back to reference Stallings. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson. Stallings. (2022). Cryptography and network security: Principles and practice (8th ed.). Pearson.
go back to reference Stevens, T., Ophoff, J., & Van Belle, J. P. (2012). The impact of personal dispositions on information security awareness and behavior. Computers & Security, 31(6), 820–830. Stevens, T., Ophoff, J., & Van Belle, J. P. (2012). The impact of personal dispositions on information security awareness and behavior. Computers & Security, 31(6), 820–830.
go back to reference Stoll, C., Klaaßen, L., & Gallersdörfer, U. (2019). The carbon footprint of bitcoin. Joule. Stoll, C., Klaaßen, L., & Gallersdörfer, U. (2019). The carbon footprint of bitcoin. Joule.
go back to reference Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. MIT Press. Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. MIT Press.
go back to reference Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media. Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
go back to reference Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday. Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday.
go back to reference Tanenbaum, A., & Steen, M. (2008). Verteilte Systeme: Prinzipien und Paradigmen (2. Aufl.). Pearson Studium München. Tanenbaum, A., & Steen, M. (2008). Verteilte Systeme: Prinzipien und Paradigmen (2. Aufl.). Pearson Studium München.
go back to reference Tanenbaum, A., & Wetherall, D. (2012). Computernetzwerke (5., akt. Aufl.). Pearson Studium München. Tanenbaum, A., & Wetherall, D. (2012). Computernetzwerke (5., akt. Aufl.). Pearson Studium München.
go back to reference Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin Portfolio. Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: How the technology behind bitcoin is changing money, business, and the world. Penguin Portfolio.
go back to reference Topol, E. (2019). Deep medicine: How artificial intelligence can make healthcare human again. Basic Books. Topol, E. (2019). Deep medicine: How artificial intelligence can make healthcare human again. Basic Books.
go back to reference Turing, A. (1950). Computing machinery and intelligence. Mind. Turing, A. (1950). Computing machinery and intelligence. Mind.
go back to reference Zhou, W., & Leckie, C. (2010). A peer-to-peer collaborative intrusion detection system (Network security, S. 351–358). Zhou, W., & Leckie, C. (2010). A peer-to-peer collaborative intrusion detection system (Network security, S. 351–358).
go back to reference Zohar, A. (2015). Bitcoin: Under the hood. ACM. Zohar, A. (2015). Bitcoin: Under the hood. ACM.
Metadata
Title
Technische Grundlagen
Authors
Matthias Janetschek
Pascal Schöttle
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-658-45724-2_2

Premium Partner