Inicio > Tecnología, ingeniería, agricultura > Tecnología: cuestiones generales > Ingeniería: general > Secure Information Management Using Linguistic Threshold Approach
Secure Information Management Using Linguistic Threshold Approach

Secure Information Management Using Linguistic Threshold Approach

Marek R. Ogiela / Urszula Ogiela

68,17 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2015
Materia
Ingeniería: general
ISBN:
9781447160403
68,17 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstruction.This is why techniques of advanced splitting and reconstruction of information form the primary subject of Secure Information Management Using Linguistic Threshold Approach, whose main purpose is to discuss the so-called linguistic threshold schemes for information sharing. An attempt is also made to describe the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution. Such information is specially protected, and its contents are used only if the authorised users are enabled to access it. This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned. The proposed information flow model can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.The use of strong mathematical cryptographic models to manage information constitutes a scientific innovation and a demonstration of the methods and opportunities of using advanced techniques for confidentially exchanging information in tasks supporting data flow within a commercial organisation.The interdisciplinary nature of the solutions proposed means that the subject of linguistic threshold schemes forming part of intelligent information management becomes a new challenge for the research and application work carried out.The authors of this monograph hope that it will guide readers on an interesting journey through the cutting edge solution in the field of secure information management.

Artículos relacionados

  • An Engineer’s Alphabet
    Henry Petroski
    ...
  • Conduct of Vessels Underway
    Captain Mehrdad Behforouzi
    This book results from sailing for 25 years at sea at different ranks, including 15 years of command and more than 20 years of teaching in maritime universities, colleges, and simulators. Lack of knowledge and misinterpretation of the rules are the reasons for Most collisions at sea. The author tried to interpret the rules of the road practically to be understandable both in th...
    Disponible

    87,94 €

  • Robotics- An Introduction
    R Manikandan
    In this book the principles and basic concepts of Robotics and its components are briefed. The readers will understand the design and implementation of robot applications and their relationship to other automated technologies. The basis of machine vision and its application in robotics are briefed. The concept of end effectors, basic programming in Robots and a few real time ap...
    Disponible

    75,58 €

  • Nonnegative and Compartmental Dynamical Systems
    Qing Hui / VijaySekhar Chellaboina / Wassim M. Haddad
    This comprehensive book provides the first unified framework for stability and dissipativity analysis and control design for nonnegative and compartmental dynamical systems, which play a key role in a wide range of fields, including engineering, thermal sciences, biology, ecology, economics, genetics, chemistry, medicine, and sociology. Using the highest standards of exposition...
  • Steady Aircraft Flight and Performance
    N. Harris McClamroch
    This undergraduate textbook offers a unique introduction to steady flight and performance for fixed-wing aircraft from a twenty-first-century flight systems perspective. Emphasizing the interplay between mathematics and engineering, it fully explains the fundamentals of aircraft flight and develops the basic algebraic equations needed to obtain the conditions for gliding flight...
  • Capacidade Do Fungo Pleurotus Ostreatus (Cogumelo Shimeji) Na Biorremediação De Solos Contaminados Com Chumbo (Pb)
    Duilio Pereira
    O Uso De Biorremediação Está Ganhando Interesse, E O Objetivo Da Presente Investigação É Usar O Fungo Pleurotus Ostreatus Para Remediar Solos Contaminados Com Chumbo (Pb) E Serragem Como Um Complemento, Um Nutriente Que Permite Maior Eficiência E Velocidade De Crescimento. Para Delinear Esta Pesquisa, Foram Testados Três Repetições E Três Tratamentos E Unidade De Uma Placa Como...
    Disponible

    11,96 €

Otros libros del autor

  • Secure Information Management Using Linguistic Threshold Approach
    Marek R. Ogiela / Urszula Ogiela
    In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstructi...
    Disponible

    48,50 €

  • Secure Information Management Using Linguistic Threshold Approach
    Marek R. Ogiela / Urszula Ogiela
    In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and ...