Inicio > > Ciencias de la computación > Inteligencia artificial > Secure Information Management Using Linguistic Threshold Approach
Secure Information Management Using Linguistic Threshold Approach

Secure Information Management Using Linguistic Threshold Approach

Marek R. Ogiela / Urszula Ogiela

48,50 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2013
Materia
Inteligencia artificial
ISBN:
9781447150176
48,50 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstruction.This is why techniques of advanced splitting and reconstruction of information form the primary subject of Secure Information Management Using Linguistic Threshold Approach, whose main purpose is to discuss the so-called linguistic threshold schemes for information sharing. An attempt is also made to describe the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution. Such information is specially protected, and its contents are used only if the authorised users are enabled to access it. This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned. The proposed information flow model can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.The use of strong mathematical cryptographic models to manage information constitutes a scientific innovation and a demonstration of the methods and opportunities of using advanced techniques for confidentially exchanging information in tasks supporting data flow within a commercial organisation.The interdisciplinary nature of the solutions proposed means that the subject of linguistic threshold schemes forming part of intelligent information management becomes a new challenge for the research and application work carried out.The authors of this monograph hope that it will guide readers on an interesting journey through the cutting edge solution in the field of secure information management.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €

Otros libros del autor

  • Secure Information Management Using Linguistic Threshold Approach
    Marek R. Ogiela / Urszula Ogiela
    In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstructi...
    Disponible

    68,17 €

  • Secure Information Management Using Linguistic Threshold Approach
    Marek R. Ogiela / Urszula Ogiela
    In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and ...