Secure information management using linguistic threshold approach (Q1946767)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Secure information management using linguistic threshold approach |
scientific article |
Statements
Secure information management using linguistic threshold approach (English)
0 references
16 April 2013
0 references
This monograph contains an in-depth discussion of a substantial area of information management and information security. The book brings the reader to the forefront of mathematical foundations of information sharing and splitting. The information splitting methods presented in the book are Shamir's algorithm and Tang algorithm. The vector algorithm, Asmuth-Bloom algorithm and Karnin-Greene-Helman algorithm are also presented as a cryptographic threshold scheme for information sharing in the book. The authors emphasize that information can be splitted within an organization based on hierarchical dependency. In this context, types of taxonomic criteria of organizational structures are briefly examined, and ways of information splitting and sharing strategies according to different taxonomy are presented in this book. The most distinguished contribution of the authors is the mathematical linguistic approach to information sharing, and it makes the book worthwhile reading for researchers. However, the book is highly recommended for not only the researchers who work on information management, but also the institutions and commercial business having a hierarchical organisation, because of providing highly practical security for them.
0 references
secret sharing
0 references
secret splitting
0 references