Table Of ContentAdvanced Information and Knowledge Processing
Marek R. Ogiela
Urszula Ogiela
Secure Information
Management Using
Linguistic Threshold
Approach
Secure Information Management
Using Linguistic Threshold Approach
Advanced Information and Knowledge Processing
Series Editors
Professor Lakhmi C. Jain
lakhmi.jain@unisa.edu.au
Professor Xindong Wu
xwu@cs.uvm.edu
Editorial Board
Farokh Bastani, University of Dallas, USA
John K Debenham, University of Technology, Sydney, Australia
Stephen Grossberg, Boston University, USA
Philip S Yu, University of Illinois, Chicago, USA
M Tamer Özsu, University of Waterloo, Canada
Tetsushi Nishida, University of Tokyo, Japan
Ning Zhong, Maebashi Institute of Technology, Japan
For further volumes:
http://www.springer.com/series/4738
Marek R. Ogiela (cid:129) Urszula Ogiela
Secure Information
Management Using
Linguistic Threshold
Approach
Marek R. Ogiela Urszula Ogiela
AGH University of Science and Technology AGH University of Science and Technology
Kraków , Poland Kraków , Poland
ISSN 1610-3947
ISBN 978-1-4471-5015-2 ISBN 978-1-4471-5016-9 (eBook)
DOI 10.1007/978-1-4471-5016-9
Springer London Heidelberg New York Dordrecht
Library of Congress Control Number: 2013947086
© Springer-Verlag London 2014
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection
with reviews or scholarly analysis or material supplied specifi cally for the purpose of being entered and
executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this
publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s
location, in its current version, and permission for use must always be obtained from Springer.
Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations
are liable to prosecution under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of
publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for
any errors or omissions that may be made. The publisher makes no warranty, express or implied, with
respect to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
We dedicate this book to our Mom, Izydora,
in gratitude for her limitless love,
and the great hope she gave us
Pref ace
Contemporary science is clearly interdisciplinary in nature. Combining the know-
ledge and scientifi c experience gained in independent research domains and areas
now allows new and astounding solutions to be developed. These, thanks to the
development of computational techniques and computer infrastructure, make it
possible to execute tasks which were once impossible. One such interesting research
area concerns the intelligent management of secret information. Management theory
has only recently paid attention to the need to introduce modern solutions in this fi eld.
Such solutions depart from the traditional approach to the matter of information
fl ow within organisational structures and are focused on the essence of data stored
in computer systems, which are highly valuable in terms of information. Ensuring
the confi dentiality and integrity of this data only became possible when the fi rst
algorithms of modern cryptography were introduced. This cryptography became
widespread as years passed and started playing a signifi cant role in communication
processes as well as strategic information management problems. Thus were
advanced mathematical techniques used in this fi eld for practical tasks performed
within the scope of information management theory. In the context of new areas of
cryptographic algorithm application for confi dential and secure management of
secret data, the development of another branch of informatics, particularly concerning
new fi elds of application for computer linguistic methods, is worth noting. Since their
very creation, such algorithms have been developed in various directions, and they
now make it possible to improve existing solutions originating from cryptography
which are used to manage secret data.
These new opportunities constitute the leading subject of this book, which, at the
same time, serves as a guide around the most up-to-date topics related to computer
linguistic techniques used in management theory and economics.
This book is the result of work carried out to combine mathematical linguistic
methods with information sharing algorithms to develop new protocols of so-called
linguistic threshold schemes for managing data within various organisational structures.
vii
viii Preface
The interdisciplinary nature of the proposed solutions poses a new challenge for
further research in and application of the proposed linguistic threshold schemes.
The authors hope that the book the reader is holding in their hands will introduce
them in an interesting and accurate way to the details of informatics as well as its
links with management theory and information hiding methods.
Marek R. Ogiela
Urszula Ogiela
Acknowledgments
The authors express their heartfelt gratitude to the Series Editors of the Advanced
Information and Knowledge Processing series at Springer, namely Prof. Lakhmi C.
Jain and Prof. Xindong Wu, for their invitation to publish this book. They would
also like to thank Helen Desmond and Ben Bishop, Springer, Computer Science,
for their help at all stages of publishing this book, and to the reviewers for providing
a series of valuable comments concerning the contents which allowed the authors to
create a better, more interesting publication.
ix