Abstract
The significance of information splitting and sharing in a commercial organization seems indisputable, as it results from the very nature of the correct use of information. Information found in an enterprise of any kind constitutes its huge asset, strength and advantage, can give it a position distinguishing it from other similar companies in the hierarchy and properly determine its place on the market. Information possessed by a commercial organisation is its strength and driving force, while the lack of a definition of significant information within an organisation represents its weakness [1].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.
Ogiela, M. R., & Ogiela, U. (2009). Secure information splitting using grammar schemes. Studies in Computational Intelligence, 244, 327–336. Springer, Berlin/Heidelberg.
Ogiela, M. R., & Ogiela, U. (2009). Shadow generation protocol in linguistic threshold schemes. Communication in Computer and Information Science, 58, 35–42. Springer, Berlin/Heidelberg.
Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.
Krcmar, H. (2006). Information management. Springer.
O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.
Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.
Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.
Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.
Ogiela, M. R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008–2008 International Conference on Security Technology, December 13–15, 2008 (pp. 125–128), Hainan Island, Sanya.
Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.
Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.
Ogiela, M. R., & Ogiela, U. (2009). Security of linguistic threshold schemes in multimedia systems. Studies in Computational Intelligence, 226, 13–20. Springer, Berlin/Heidelberg.
Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.
Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.
Asmuth, C., & Bloom, J. (1983). A modular approach to key safeguarding. IEEE Transactions on Information Theory, 29, 208–210.
Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.
Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Constructions and bounds for visual cryptography. Lecture Notes in Computer Science, 1099, 416–428.
Beguin, P., & Cresti, A. (1995). General short computational secret sharing schemes. Lecture Notes in Computer Science, 921, 194–208.
Beimel, A., & Chor, B. (1994). Universally ideal secret sharing schemes. IEEE Transactions on Information Theory, 40, 786–794.
Berners-Lee, T., Fensel, D., Hendler, J. A., Lieberman, H., & Wahlster, W. (Eds.). (2005). Spinning the semantic web: Bringing the World Wide Web to its full potential. Cambridge: The MIT Press.
Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.
Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science, 4882, 283–292.
Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.
Chomsky, N. (1957). Syntactic structures. London: Mouton.
ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.
Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.
Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.
Karnin, E. D., Greene, J. W., & Hellman, M. E. (1983). On sharing secret systems. IEEE Transactions on Information Theory, 29, 35–41.
Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.
Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.
Martin, K. M. (1993). Untrustworthy participants in perfect secret sharing schemes (Cryptography and coding III, pp. 255–264). Oxford: Clarendon.
Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.
Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.
Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, December 13–15, 2008 (Vol. 1, pp. 377–380), Hainan Island.
Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.
Ong, H., Schnorr, C. P., & Shamir, A. (1985). Efficient signature schemes based on polynomial equations. In: Advances in Cryptology Proceedings of CRYPTO’84 (pp. 37–46). New York: Springer.
Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.
Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.
Shannon, C. E. (1945). A mathematical theory of cryptography. Bell Telephone Labs
Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal
Simmons, G. J. (1992). An introduction to shared secret and/or shared control schemes and their application. In Contemporary cryptology: The science of information integrity (pp. 441–497). Piscataway: IEEE Press.
Simmons, G. J. (1994). Subliminal channels: Past and present. European Transactions on Telecommunications, 5, 459–473.
Simmons, G. J. (1993). The subliminal channels of the US digital signature algorithm (DSA). In: Proceedings of the Third Symposium on State and Progress of Research in Cryptography (pp. 35–54), Rome.
Tang, S. (2004). Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 1, 259–262.
Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.
Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.
van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.
Wang, S. J., Tsai, Y. R., & Chen, P. Y. (2007). Proactive (k, n) threshold secret sharing scheme with variant k and n. In: Proceedings of the IPC 2007 – The 2007 International Conference on Intelligent Pervasive Computing (pp. 117–120), October 11–13th, 2007. Jeju Island.
Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.
Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.
Wu, T. C., & He, W. H. (1995). A geometric approach for sharing secrets. Computers and Security, 14, 135–146.
Zheng, Y., Hardjono, T., & Seberry, J. (1994). Reusing shares in secret sharing schemes. Computer, 37, 199–205.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag London
About this chapter
Cite this chapter
Ogiela, M.R., Ogiela, U. (2014). Methodological Aspects of Information Sharing and Management in Organizations. In: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-5016-9_6
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5016-9_6
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5015-2
Online ISBN: 978-1-4471-5016-9
eBook Packages: Computer ScienceComputer Science (R0)