Security and Privacy in Distributed Information Management

被引:3
|
作者
Ogiela, Marek R. [1 ]
Ogiela, Lidia [1 ]
Ogiela, Urszula [1 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
来源
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2014年
关键词
cryptographic protocols; bio-inspired cryptography; secret sharing algorithms;
D O I
10.1109/INCoS.2014.108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In our paper will be presented some advances in procedures used for encryption and division of secret data, as well as modern approaches for management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will describe algorithms allowing for visual information division and sharing on the basis of personal features. The development of computer techniques for classified information sharing should also be useful in the process of shared information distribution and management. For this purpose there will be presented a new approach for information management based on cognitive information systems.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [21] Introduction of the Minitrack on Information Security and Privacy
    Bui, Tung
    Clemons, Eric
    Wang, David
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 4792 - 4792
  • [22] Information Security Matters: Privacy for Sale
    Ross, Steven J.
    ISACA Journal, 2022, 2 : 4 - 5
  • [23] Security and Privacy Concerns in Information Usability
    Yang, Liang-Chih
    2024 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS, WACVW 2024, 2024, : 679 - 684
  • [24] Current Standards for Information Security and Privacy
    Ban, Tiberiu T.
    RECENT DEBATES IN CYBERSPACE AND ARTIFICIAL INTELLIGENCE LAW, 2023, : 53 - 71
  • [25] Privacy, confidentiality, and security of healthcare information
    Dickerson, Jonathan E.
    ANAESTHESIA AND INTENSIVE CARE MEDICINE, 2022, 23 (11): : 740 - 743
  • [26] An Exploration of RFID Information Security and Privacy
    Chen, Chih-Yung
    Kuo, Chien-Ping
    Chien, Fang-Yuan
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 65 - +
  • [27] INFORMATION-SYSTEMS SECURITY AND PRIVACY
    WARE, WH
    COMMUNICATIONS OF THE ACM, 1984, 27 (04) : 315 - 321
  • [28] Maintaining security and privacy of patient information
    Ferrante, Frank E.
    2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-15, 2006, : 6392 - 6392
  • [29] Information security and privacy of health data
    Win, Khin Than
    Susilo, Willy
    INTERNATIONAL JOURNAL OF HEALTHCARE TECHNOLOGY AND MANAGEMENT, 2006, 7 (06) : 492 - 505
  • [30] PRIVACY - SECURITY OF COMPUTERIZED PERSONAL INFORMATION
    OCONNOR, KP
    INFORMATION PRIVACY, 1979, 1 (03): : 120 - 123