Linguistic protocols for secure information management and sharing
Marek R. Ogiela,Urszula Ogiela +1 more
Reads0
Chats0
TLDR
The expansion of the traditional techniques for the division of secrets and the development of the so-called linguistic threshold schemes, a new concept based on the traditional algorithms of the Division of information which additionally introduces the stage of linguistic conversion of shared data using specially defined formal grammar are focused on.Abstract:
One issue which is essential for the security of calculations and communication as well as the ability to guarantee data confidentiality is intelligent threshold division of strategic information that may later be passed on to a group of authorized users for reconstruction and shared use. Enabling such division of information acquires particular significance with regard to the management of important and confidential data by various national institutions, corporations or strategic (military) units. It seems that these techniques will become increasingly more important along with the growing number of their applications. The division of confidential information is inevitably related to the cryptographic algorithms of the division of secrets. Relying on these techniques, this paper will focus on two issues. The first is the expansion of the traditional techniques for the division of secrets and the development of the so-called linguistic threshold schemes, a new concept based on the traditional algorithms of the division of information which additionally introduces the stage of linguistic conversion of shared data using specially defined formal grammar. The other is the demonstration of how linguistic threshold schemes thus developed may be used to manage secret data in a variety of selected organizational structures.read more
Citations
More filters
Journal ArticleDOI
Automated Insider Threat Detection System Using User and Role-Based Profile Assessment
TL;DR: An automated system that is capable of detecting insider threats within an organization is described with a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then uses this to obtain a consistent representation of features that provide a rich description of the user's behavior.
Journal ArticleDOI
Insider Threats and Cryptographic Techniques in Secure Information Management
Lidia Ogiela,Marek R. Ogiela +1 more
TL;DR: A new protocol that allows to protect data in different management structures and is based on cognitive systems allow to guarantee the secure features and make the management processes more efficient.
Book
Secure Information Management Using Linguistic Threshold Approach
Marek R. Ogiela,Urszula Ogiela +1 more
TL;DR: This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned, which can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.
Journal ArticleDOI
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems
Hoon Ko,MoonBae Song +1 more
TL;DR: This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key, and the proposed method outperforms the existing methods in terms of computation cost.
Journal ArticleDOI
Intelligent techniques for secure financial management in cloud computing
TL;DR: New classes of financial management systems dedicated to cloud-based semantic management of financial data and new aspects of the intelligent techniques dedicated for secure financial management in cloud computing are proposed.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book
Understanding Cryptography: A Textbook For Students And Practitioners
Christof Paar,Jan Pelzl +1 more
TL;DR: The authors move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
Studies in Computational Intelligence
TL;DR: The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them.
Book
Cryptography Engineering: Design Principles and Practical Applications
TL;DR: This essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management, and discovers techniques for building cryptography into products from the start and examines updates and changes to cryptography.
Journal ArticleDOI
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
Marek R. Ogiela,Urszula Ogiela +1 more
TL;DR: New opportunities for creating threshold schemes for secret sharing arising from the use of mathematical linguistic formalisms based on known threshold schemes of information splitting extended by adding an extra stage at which bit blocks of the shared information are coded using suitably defined context-free grammars are discussed.