Skip to main content
Top
Published in:
Cover of the book

2014 | OriginalPaper | Chapter

1. Introduction

Authors : Marek R. Ogiela, Urszula Ogiela

Published in: Secure Information Management Using Linguistic Threshold Approach

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

One of the fastest developing subjects associated with applying modern information technologies to manage processes at commercial organisations comprises the acquisition, the flow as well as planning, controlling, analysing, designing and defining detailed actions which forms the main component of the information management process. Scientific research in this field is interdisciplinary in nature and based on knowledge of management, mathematics and information theory, particularly knowledge engineering. The significance and wide popularity of this subject has justified distinguishing a new line of research, called Information Management [1–4]. A new subject, namely the techniques for protecting and encrypting (hiding) important information and protected information [5], has merged with the line of research on the subject and problems of information management. The problems of information encryption and protection are rooted in cryptography, which mainly uses algorithms for ensuring data confidentiality and information division techniques, as well methods of reconstructing information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
2.
go back to reference Krcmar, H. (2006). Information management. Springer. Krcmar, H. (2006). Information management. Springer.
3.
go back to reference Reynolds, G. (2009). Information technology for managers. Boston: Course Technology. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
4.
go back to reference Schermerhorn, J.R. (2012). Management. Hoboken: Wiley. Schermerhorn, J.R. (2012). Management. Hoboken: Wiley.
5.
go back to reference Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet
6.
go back to reference Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef
7.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef
8.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef
9.
go back to reference Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef
10.
go back to reference Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef
11.
go back to reference Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.
12.
go back to reference Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
13.
go back to reference Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
14.
go back to reference Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure (Lecture notes in computer science, Vol. 6059, pp. 175–182). Berlin/New York: Springer. Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure (Lecture notes in computer science, Vol. 6059, pp. 175–182). Berlin/New York: Springer.
15.
go back to reference Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH
16.
go back to reference Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH
17.
go back to reference van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef
18.
go back to reference Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
Metadata
Title
Introduction
Authors
Marek R. Ogiela
Urszula Ogiela
Copyright Year
2014
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5016-9_1

Premium Partner