Security and Privacy in Distributed Information Management

被引:3
|
作者
Ogiela, Marek R. [1 ]
Ogiela, Lidia [1 ]
Ogiela, Urszula [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
来源
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2014年
关键词
cryptographic protocols; bio-inspired cryptography; secret sharing algorithms;
D O I
10.1109/INCoS.2014.108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In our paper will be presented some advances in procedures used for encryption and division of secret data, as well as modern approaches for management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will describe algorithms allowing for visual information division and sharing on the basis of personal features. The development of computer techniques for classified information sharing should also be useful in the process of shared information distribution and management. For this purpose there will be presented a new approach for information management based on cognitive information systems.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [1] Security and Privacy in Information Management in a Distributed Environment for Public Organizations
    Toapanta, Segundo Moises Toapanta
    Teran Terranova, Yaritza Julieth
    Naranjo Sanchez, Bertha Alice
    Mafla Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING VI, 2020, 331 : 378 - 389
  • [2] Security in Management of Distributed Information
    Ogiela, Marek R.
    Ogiela, Lidia
    Ogiela, Urszula
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 457 - 462
  • [3] Usable privacy and security for personal information management
    Karat, CM
    Brodie, C
    Karat, J
    COMMUNICATIONS OF THE ACM, 2006, 49 (01) : 56 - 57
  • [4] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [5] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [6] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [7] INTEGRATED INCIDENT MANAGEMENT MODEL FOR DATA PRIVACY AND INFORMATION SECURITY
    Dombora, Sandor
    XIV INTERNATIONAL MAY CONFERENCE ON STRATEGIC MANAGEMENT, VOL XIV, ISSUE (1) (2018), 2018, 14 (01): : 319 - 328
  • [8] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [9] Security and privacy in the information economy
    Feigenbaum, J
    Rudich, S
    Blaze, M
    McCurley, K
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1997, 94 (07) : 2789 - 2792
  • [10] Privacy and security of medical information
    Jobes, KE
    White, ER
    Antonelli, PJ
    OTOLARYNGOLOGIC CLINICS OF NORTH AMERICA, 2002, 35 (06) : 1203 - +