Skip to main content
Erschienen in: Information Systems Frontiers 5/2015

01.10.2015

Advances in secure knowledge management in the big data era

verfasst von: Chittaranjan Hota, Shambhu Upadhyaya, Jamal Nazzal Al-Karaki

Erschienen in: Information Systems Frontiers | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living in an on-command, on-demand Big data world. In this era, more information is being created by individuals than by business houses. In the past, we had to stand in a queue at a railway reservation counter to book our tickets, had to visit a cash counter in a bank to do our transactions, had to arrange a get together at a physical location within our town to meet and socialize with our friends, had to visit a theater to watch a movie, and so on. We now have Information and Communication Technology (ICT) to help us do all these by sitting in front of a computer and with a few mouse clicks. Also, all these advancements are possible because we are drenched in a flood of data today. It is important to distinguish between data, information and knowledge. Data is a set of facts about events. Information is a processed set of facts that are meaningful. Knowledge is broader, deeper and richer than both data and information. Knowledge answers questions like “How”. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bertino, E., Khan, L.R., Sandhu, R., & Thuraisingham, B. (2006). Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3), 429–438.CrossRef Bertino, E., Khan, L.R., Sandhu, R., & Thuraisingham, B. (2006). Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 36(3), 429–438.CrossRef
Zurück zum Zitat Lee, J., Upadhyaya, S.J., Rao, H.R., & Sharman, R. (2005). Secure knowledge management and the semantic web. Communications of the ACM, 48(12), 48–54.CrossRef Lee, J., Upadhyaya, S.J., Rao, H.R., & Sharman, R. (2005). Secure knowledge management and the semantic web. Communications of the ACM, 48(12), 48–54.CrossRef
Zurück zum Zitat Lee, J., Agrawal, M., & Rao, H. (2015). Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9568-z. Lee, J., Agrawal, M., & Rao, H. (2015). Message diffusion through social network service: The case of rumor and non-rumor related tweets during boston bombing 2013. Information Systems Frontiers, 17(5). doi:10.​1007/​s10796-015-9568-z.
Zurück zum Zitat Mehresh, R., & Upadhyaya, S. (2015). Surviving advanced persistent threats in a distributed environment–architecture and analysis. Information Systems Frontiers, 17 (5). doi:10.1007/s10796-015-9569-y. Mehresh, R., & Upadhyaya, S. (2015). Surviving advanced persistent threats in a distributed environment–architecture and analysis. Information Systems Frontiers, 17 (5). doi:10.​1007/​s10796-015-9569-y.
Zurück zum Zitat Rajpathak, T., & Narsingpurkar, A. (2013). Knowledge from big data analytics in product development. TCS white paper. Rajpathak, T., & Narsingpurkar, A. (2013). Knowledge from big data analytics in product development. TCS white paper.
Zurück zum Zitat Sun, Y., & Upadhyaya, S. (2015). Secure and privacy-preserving data processing support for active authentication. Information Systems Frontiers, 17(5). doi:10.1007/s10796-015-9587-9. Sun, Y., & Upadhyaya, S. (2015). Secure and privacy-preserving data processing support for active authentication. Information Systems Frontiers, 17(5). doi:10.​1007/​s10796-015-9587-9.
Zurück zum Zitat Thuraisingham, B., & Parikh, P. (2008). Trustworthy semantic web technologies for secure knowledge management. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp 186–193. Thuraisingham, B., & Parikh, P. (2008). Trustworthy semantic web technologies for secure knowledge management. In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, IEEE, pp 186–193.
Zurück zum Zitat Upadhyaya, S., Rao, H.R., & Padmanabhan, G. (2006). Secure knowledge management. Idea group inc. Upadhyaya, S., Rao, H.R., & Padmanabhan, G. (2006). Secure knowledge management. Idea group inc.
Zurück zum Zitat Wolf, S. (2012). Security management for knowledge assets. Wolf, S. (2012). Security management for knowledge assets.
Metadaten
Titel
Advances in secure knowledge management in the big data era
verfasst von
Chittaranjan Hota
Shambhu Upadhyaya
Jamal Nazzal Al-Karaki
Publikationsdatum
01.10.2015
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 5/2015
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-015-9593-y

Weitere Artikel der Ausgabe 5/2015

Information Systems Frontiers 5/2015 Zur Ausgabe