Skip to main content

2019 | OriginalPaper | Buchkapitel

Innovative Protocols for Data Sharing and Cyber Systems Security

verfasst von : Urszula Ogiela, Makoto Takizawa, Lidia Ogiela

Erschienen in: Advances in Network-Based Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper will be presented new classes of cryptographic secret sharing procedures dedicated for secure information division and transmission. In particular will be presented two classes of protocols, which allow to share information with application of grammar solutions, as well as personal or behavioral parameters. Some possible application of such technologies will also be presented especially with relation to secure data or services management in distributed structures or Cloud environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)CrossRef Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manag. 35(2), 154–159 (2015)CrossRef
3.
Zurück zum Zitat Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004) Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)
4.
Zurück zum Zitat Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, Berlin (2014)CrossRef Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Springer, Berlin (2014)CrossRef
5.
Zurück zum Zitat Ogiela, U., Takizawa, M., Ogiela, L.: Classification of Cognitive Service Management Systems in Cloud Computing. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Berlin (2018) Ogiela, U., Takizawa, M., Ogiela, L.: Classification of Cognitive Service Management Systems in Cloud Computing. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Berlin (2018)
6.
Zurück zum Zitat Beimel, A., Farras, O., Mintz, Y.: Secret-sharing schemes for very dense graphs. J. Cryptol. 29(2), 336–362 (2016)MathSciNetCrossRef Beimel, A., Farras, O., Mintz, Y.: Secret-sharing schemes for very dense graphs. J. Cryptol. 29(2), 336–362 (2016)MathSciNetCrossRef
7.
Zurück zum Zitat van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)MATH van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)MATH
8.
Zurück zum Zitat Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)CrossRef Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)CrossRef
9.
Zurück zum Zitat Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)CrossRef Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)CrossRef
10.
Zurück zum Zitat Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mobile Comput. 29, 130–141 (2016)CrossRef Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mobile Comput. 29, 130–141 (2016)CrossRef
11.
Zurück zum Zitat Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016) Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016)
12.
Zurück zum Zitat Grossberg, S.: Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Netw. 37, 1–47 (2012)CrossRef Grossberg, S.: Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Netw. 37, 1–47 (2012)CrossRef
13.
Zurück zum Zitat Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011, Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011) Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011, Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)
14.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Chichester (1996)MATH Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Chichester (1996)MATH
Metadaten
Titel
Innovative Protocols for Data Sharing and Cyber Systems Security
verfasst von
Urszula Ogiela
Makoto Takizawa
Lidia Ogiela
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98530-5_37