Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

Buy

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstruction.

This is why techniques of advanced splitting and reconstruction of information form the primary subject of Secure Information Management Using Linguistic Threshold Approach, whose main purpose is to discuss the so-called linguistic threshold schemes for information sharing. An attempt is also made to describe the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution. Such information is specially protected, and its contents are used only if the authorised users are enabled to access it. This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned. The proposed information flow model can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.

The use of strong mathematical cryptographic models to manage information constitutes a scientific innovation and a demonstration of the methods and opportunities of using advanced techniques for confidentially exchanging information in tasks supporting data flow within a commercial organisation.

The interdisciplinary nature of the solutions proposed means that the subject of linguistic threshold schemes forming part of intelligent information management becomes a new challenge for the research and application work carried out.

The authors of this monograph hope that it will guide readers on an interesting journey through the cutting edge solution in the field of secure information management.

(HTML tags aren't allowed.)

The Lean Six Sigma Pocket Toolbook: A Quick Reference Guide to 100 Tools for Improving Quality and Speed
The Lean Six Sigma Pocket Toolbook: A Quick Reference Guide to 100 Tools for Improving Quality and Speed

The Lean Six Sigma Pocket Toolbook is today's most complete and results-based reference to the tools and concepts needed to understand, implement, and leverage Lean Six Sigma. The only guide that groups tools by purpose and use, this hands-on reference provides:

  • Analyses of nearly 100 tools and methodologies--from...
Cost Reduction and Control Best Practices: The Best Ways for a Financial Manager to Save Money
Cost Reduction and Control Best Practices: The Best Ways for a Financial Manager to Save Money
Cost Reduction and Control Best Practices provides financial manages with no-nonsense, balanced, and practical strategies that are being targeted and used nationwide for controlling costs by thousands of companies in areas such as human resources, compensation, benefits, purchasing, outsourcing, use of consultants, taxes, and exports. These best...
Antiangiogenic Cancer Therapy
Antiangiogenic Cancer Therapy

Top Investigators Explore the Complexities of Angiogenesis Cancer Research

The targeting of tumor angiogenesis has evolved into one of the most widely pursued therapeutic strategies. However, as of yet, no antiangiogenic agent used as a monotherapy has demonstrated a survival benefit in a randomized Phase III trial. The...


Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Evolving Web services standards and technologies offer limited interoperability when it comes to security, management, and other important application characteristics. Successful interoperability solutions require comprehensive integration strategies that go beyond simple connections. The capability to mitigate security and reliability risks and...
Sencha Touch Mobile JavaScript Framework
Sencha Touch Mobile JavaScript Framework
Since its initial launch, Sencha Touch has quickly become the gold standard for developing rich mobile web applications with HTML5. Sencha Touch is the first HTML5 mobile JavaScript framework that allows you to develop mobile web applications that look and feel like native applications on both iPhone and Android touchscreen...
Islam: A Brief History (CourseSmart)
Islam: A Brief History (CourseSmart)

Reflecting recent global developments, the second edition of this illuminating introduction to Islamic history expands its coverage of the Qur’an, Sufism, and Muslim views on human rights, including the rights of women.

  • An expanded new edition of this concise, illuminating introduction to Islam, written by one of the...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy