تکنیک های رمزنگاری شناختی برای مدیریت اطلاعات هوشمند / Cognitive cryptography techniques for intelligent information management

تکنیک های رمزنگاری شناختی برای مدیریت اطلاعات هوشمند Cognitive cryptography techniques for intelligent information management

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : Elsevier
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی فناوری اطلاعات، کامپیوتر
گرایش های مرتبط مهندسی نرم افزار و امنیت اطلاعات
مجله بین المللی مدیریت اطلاعات – International Journal of Information Management
دانشگاه AGH University of Science and Technology – Poland

منتشر شده در نشریه الزویر
کلمات کلیدی انگلیسی Intelligent information management, Cognitive cryptography, Semantic and personal information, Data sharing

Description

1. Introduction Cryptographic techniques are used to secure information and restrict access to it. Securing the information is mainly aimed at protecting it from theft. This theft is understood as the ability of unauthorised individuals (systems) to access information and use it (Menezes, van Oorschot, & Vanstone, 2001; Ogiela, 2016; Schneier, 1996). Every piece of information is thus subject to protection whose level depends on the important message (data) contained in this information. It is, however, worth noting that in the case of information which is in public domain, this information is not subject to any special security, but if it has to be protected, cryptographic protocols can be used for this purpose. In the case of data that is confidential, secret or strategic, it is necessary to use data protection algorithms to verify the individuals having access to this data. Cryptographic algorithms are among those that are to ensure the appropriate security and protection of information (Beimel et al. 2016; Ogiela, 2015b; Ogiela & Ogiela, 2008, 2011, 2014; Tang, 2004). They are considered secure if their use ensures the complete protection of data. Data security is a necessary element in the operation of various information exchange processes. These processes can include, for instance, the exchange of information between: • parties to or participants of a process – the exchange of information between various individuals who participate in the data/information exchange process, • sites where process participants are located – the exchange of information between different places in which parties to the process are situated, such as company branches, representative offices, remote sites, • process participants, but at different points in time – creating copies of information which will be reproduced after a certain period of time has expired. In all the above situations, the complexity of the process of exchanging information between parties to the protocol should be accounted for as well (Shamir, 1979; TalebiFard & Leung, 2011). This is because there are single, simple information exchange protocols, and protocols dedicated to complex ranges of users, such as information splitting and sharing. These kinds of solutions are designed for securing data by splitting it and distributing parts of this split information (the so-called shadows) among a selected group of secrets trustees. This information is not stored by one protocol participant whose action would depend only on their own decisions, but is distributed among a specific group of participants (individuals, computers), who should act rationally as a group. This means that if a decision needs to be taken, a group of secret trustees must work in concert, and in addition: • intent to disclose the secret in a situation in which its contents need to be disclosed, • guard the secret if its security is threatened. Any action aimed at operating contrary to the other participants may cause: • disclosing secret information in a situation in which it should not have been, • no access to the information when its disclosure has a priority, overriding nature.
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری