Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Marek R. Ogiela, Urszula Ogiela

Erschienen in: Secure Information Management Using Linguistic Threshold Approach

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

One of the fastest developing subjects associated with applying modern information technologies to manage processes at commercial organisations comprises the acquisition, the flow as well as planning, controlling, analysing, designing and defining detailed actions which forms the main component of the information management process. Scientific research in this field is interdisciplinary in nature and based on knowledge of management, mathematics and information theory, particularly knowledge engineering. The significance and wide popularity of this subject has justified distinguishing a new line of research, called Information Management [1–4]. A new subject, namely the techniques for protecting and encrypting (hiding) important information and protected information [5], has merged with the line of research on the subject and problems of information management. The problems of information encryption and protection are rooted in cryptography, which mainly uses algorithms for ensuring data confidentiality and information division techniques, as well methods of reconstructing information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
2.
Zurück zum Zitat Krcmar, H. (2006). Information management. Springer. Krcmar, H. (2006). Information management. Springer.
3.
Zurück zum Zitat Reynolds, G. (2009). Information technology for managers. Boston: Course Technology. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
4.
Zurück zum Zitat Schermerhorn, J.R. (2012). Management. Hoboken: Wiley. Schermerhorn, J.R. (2012). Management. Hoboken: Wiley.
5.
Zurück zum Zitat Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.MathSciNet
6.
Zurück zum Zitat Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.MATHCrossRef
7.
Zurück zum Zitat Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.MathSciNetMATHCrossRef
8.
Zurück zum Zitat Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.MathSciNetCrossRef
9.
Zurück zum Zitat Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.CrossRef
10.
Zurück zum Zitat Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.MathSciNetMATHCrossRef
11.
Zurück zum Zitat Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.
12.
Zurück zum Zitat Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
13.
Zurück zum Zitat Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
14.
Zurück zum Zitat Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure (Lecture notes in computer science, Vol. 6059, pp. 175–182). Berlin/New York: Springer. Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure (Lecture notes in computer science, Vol. 6059, pp. 175–182). Berlin/New York: Springer.
15.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.MATH
16.
Zurück zum Zitat Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.MATH
17.
Zurück zum Zitat van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.MATHCrossRef
18.
Zurück zum Zitat Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
Metadaten
Titel
Introduction
verfasst von
Marek R. Ogiela
Urszula Ogiela
Copyright-Jahr
2014
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5016-9_1