ebook img

Secure Information Management Using Linguistic Threshold Approach PDF

147 Pages·2014·3.879 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Secure Information Management Using Linguistic Threshold Approach

Advanced Information and Knowledge Processing Marek R. Ogiela Urszula Ogiela Secure Information Management Using Linguistic Threshold Approach Secure Information Management Using Linguistic Threshold Approach Advanced Information and Knowledge Processing Series Editors Professor Lakhmi C. Jain [email protected] Professor Xindong Wu [email protected] Editorial Board Farokh Bastani, University of Dallas, USA John K Debenham, University of Technology, Sydney, Australia Stephen Grossberg, Boston University, USA Philip S Yu, University of Illinois, Chicago, USA M Tamer Özsu, University of Waterloo, Canada Tetsushi Nishida, University of Tokyo, Japan Ning Zhong, Maebashi Institute of Technology, Japan For further volumes: http://www.springer.com/series/4738 Marek R. Ogiela (cid:129) Urszula Ogiela Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela Urszula Ogiela AGH University of Science and Technology AGH University of Science and Technology Kraków , Poland Kraków , Poland ISSN 1610-3947 ISBN 978-1-4471-5015-2 ISBN 978-1-4471-5016-9 (eBook) DOI 10.1007/978-1-4471-5016-9 Springer London Heidelberg New York Dordrecht Library of Congress Control Number: 2013947086 © Springer-Verlag London 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifi cally for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) We dedicate this book to our Mom, Izydora, in gratitude for her limitless love, and the great hope she gave us Pref ace Contemporary science is clearly interdisciplinary in nature. Combining the know- ledge and scientifi c experience gained in independent research domains and areas now allows new and astounding solutions to be developed. These, thanks to the development of computational techniques and computer infrastructure, make it possible to execute tasks which were once impossible. One such interesting research area concerns the intelligent management of secret information. Management theory has only recently paid attention to the need to introduce modern solutions in this fi eld. Such solutions depart from the traditional approach to the matter of information fl ow within organisational structures and are focused on the essence of data stored in computer systems, which are highly valuable in terms of information. Ensuring the confi dentiality and integrity of this data only became possible when the fi rst algorithms of modern cryptography were introduced. This cryptography became widespread as years passed and started playing a signifi cant role in communication processes as well as strategic information management problems. Thus were advanced mathematical techniques used in this fi eld for practical tasks performed within the scope of information management theory. In the context of new areas of cryptographic algorithm application for confi dential and secure management of secret data, the development of another branch of informatics, particularly concerning new fi elds of application for computer linguistic methods, is worth noting. Since their very creation, such algorithms have been developed in various directions, and they now make it possible to improve existing solutions originating from cryptography which are used to manage secret data. These new opportunities constitute the leading subject of this book, which, at the same time, serves as a guide around the most up-to-date topics related to computer linguistic techniques used in management theory and economics. This book is the result of work carried out to combine mathematical linguistic methods with information sharing algorithms to develop new protocols of so-called linguistic threshold schemes for managing data within various organisational structures. vii viii Preface The interdisciplinary nature of the proposed solutions poses a new challenge for further research in and application of the proposed linguistic threshold schemes. The authors hope that the book the reader is holding in their hands will introduce them in an interesting and accurate way to the details of informatics as well as its links with management theory and information hiding methods. Marek R. Ogiela Urszula Ogiela Acknowledgments The authors express their heartfelt gratitude to the Series Editors of the Advanced Information and Knowledge Processing series at Springer, namely Prof. Lakhmi C. Jain and Prof. Xindong Wu, for their invitation to publish this book. They would also like to thank Helen Desmond and Ben Bishop, Springer, Computer Science, for their help at all stages of publishing this book, and to the reviewers for providing a series of valuable comments concerning the contents which allowed the authors to create a better, more interesting publication. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.