Secure information management using linguistic threshold approach (Q1946767)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Secure information management using linguistic threshold approach
scientific article

    Statements

    Secure information management using linguistic threshold approach (English)
    0 references
    0 references
    0 references
    16 April 2013
    0 references
    This monograph contains an in-depth discussion of a substantial area of information management and information security. The book brings the reader to the forefront of mathematical foundations of information sharing and splitting. The information splitting methods presented in the book are Shamir's algorithm and Tang algorithm. The vector algorithm, Asmuth-Bloom algorithm and Karnin-Greene-Helman algorithm are also presented as a cryptographic threshold scheme for information sharing in the book. The authors emphasize that information can be splitted within an organization based on hierarchical dependency. In this context, types of taxonomic criteria of organizational structures are briefly examined, and ways of information splitting and sharing strategies according to different taxonomy are presented in this book. The most distinguished contribution of the authors is the mathematical linguistic approach to information sharing, and it makes the book worthwhile reading for researchers. However, the book is highly recommended for not only the researchers who work on information management, but also the institutions and commercial business having a hierarchical organisation, because of providing highly practical security for them.
    0 references
    secret sharing
    0 references
    secret splitting
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references