Skip to main content
Top

2019 | OriginalPaper | Chapter

Innovative Protocols for Data Sharing and Cyber Systems Security

Authors : Urszula Ogiela, Makoto Takizawa, Lidia Ogiela

Published in: Advances in Network-Based Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper will be presented new classes of cryptographic secret sharing procedures dedicated for secure information division and transmission. In particular will be presented two classes of protocols, which allow to share information with application of grammar solutions, as well as personal or behavioral parameters. Some possible application of such technologies will also be presented especially with relation to secure data or services management in distributed structures or Cloud environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)CrossRef Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)CrossRef
3.
go back to reference Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004) Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)
4.
go back to reference Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, Berlin (2014)CrossRef Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, Berlin (2014)CrossRef
5.
go back to reference Ogiela, U., Takizawa, M., Ogiela, L.: Classification of Cognitive Service Management Systems in Cloud Computing. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Berlin (2018) Ogiela, U., Takizawa, M., Ogiela, L.: Classification of Cognitive Service Management Systems in Cloud Computing. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Berlin (2018)
6.
go back to reference Beimel, A., Farras, O., Mintz, Y.: Secret-sharing schemes for very dense graphs. J. Cryptol. 29(2), 336–362 (2016)MathSciNetCrossRef Beimel, A., Farras, O., Mintz, Y.: Secret-sharing schemes for very dense graphs. J. Cryptol. 29(2), 336–362 (2016)MathSciNetCrossRef
7.
go back to reference van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)MATH van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)MATH
8.
go back to reference Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)CrossRef Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)CrossRef
9.
go back to reference Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)CrossRef Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)CrossRef
10.
go back to reference Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mobile Comput. 29, 130–141 (2016)CrossRef Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mobile Comput. 29, 130–141 (2016)CrossRef
11.
go back to reference Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016) Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016)
12.
go back to reference Grossberg, S.: Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Netw. 37, 1–47 (2012)CrossRef Grossberg, S.: Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Netw. 37, 1–47 (2012)CrossRef
13.
go back to reference Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011, Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011) Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011, Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)
14.
go back to reference Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Chichester (1996)MATH Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Chichester (1996)MATH
Metadata
Title
Innovative Protocols for Data Sharing and Cyber Systems Security
Authors
Urszula Ogiela
Makoto Takizawa
Lidia Ogiela
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-98530-5_37

Premium Partner