scispace - formally typeset
Open AccessJournal ArticleDOI

Linguistic protocols for secure information management and sharing

Reads0
Chats0
TLDR
The expansion of the traditional techniques for the division of secrets and the development of the so-called linguistic threshold schemes, a new concept based on the traditional algorithms of the Division of information which additionally introduces the stage of linguistic conversion of shared data using specially defined formal grammar are focused on.
Abstract
One issue which is essential for the security of calculations and communication as well as the ability to guarantee data confidentiality is intelligent threshold division of strategic information that may later be passed on to a group of authorized users for reconstruction and shared use. Enabling such division of information acquires particular significance with regard to the management of important and confidential data by various national institutions, corporations or strategic (military) units. It seems that these techniques will become increasingly more important along with the growing number of their applications. The division of confidential information is inevitably related to the cryptographic algorithms of the division of secrets. Relying on these techniques, this paper will focus on two issues. The first is the expansion of the traditional techniques for the division of secrets and the development of the so-called linguistic threshold schemes, a new concept based on the traditional algorithms of the division of information which additionally introduces the stage of linguistic conversion of shared data using specially defined formal grammar. The other is the demonstration of how linguistic threshold schemes thus developed may be used to manage secret data in a variety of selected organizational structures.

read more

Citations
More filters
Journal ArticleDOI

Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

TL;DR: An automated system that is capable of detecting insider threats within an organization is described with a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then uses this to obtain a consistent representation of features that provide a rich description of the user's behavior.
Journal ArticleDOI

Insider Threats and Cryptographic Techniques in Secure Information Management

TL;DR: A new protocol that allows to protect data in different management structures and is based on cognitive systems allow to guarantee the secure features and make the management processes more efficient.
Book

Secure Information Management Using Linguistic Threshold Approach

TL;DR: This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned, which can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.
Journal ArticleDOI

A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems

TL;DR: This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key, and the proposed method outperforms the existing methods in terms of computation cost.
Journal ArticleDOI

Intelligent techniques for secure financial management in cloud computing

TL;DR: New classes of financial management systems dedicated to cloud-based semantic management of financial data and new aspects of the intelligent techniques dedicated for secure financial management in cloud computing are proposed.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Understanding Cryptography: A Textbook For Students And Practitioners

Christof Paar, +1 more
TL;DR: The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.

Studies in Computational Intelligence

TL;DR: The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them.
Book

Cryptography Engineering: Design Principles and Practical Applications

TL;DR: This essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management, and discovers techniques for building cryptography into products from the start and examines updates and changes to cryptography.
Journal ArticleDOI

The use of mathematical linguistic methods in creating secret sharing threshold algorithms

TL;DR: New opportunities for creating threshold schemes for secret sharing arising from the use of mathematical linguistic formalisms based on known threshold schemes of information splitting extended by adding an extra stage at which bit blocks of the shared information are coded using suitably defined context-free grammars are discussed.