Skip to main content

Methodological Aspects of Information Sharing and Management in Organizations

  • Chapter
  • First Online:
Secure Information Management Using Linguistic Threshold Approach

Part of the book series: Advanced Information and Knowledge Processing ((AI&KP))

  • 755 Accesses

Abstract

The significance of information splitting and sharing in a commercial organization seems indisputable, as it results from the very nature of the correct use of information. Information found in an enterprise of any kind constitutes its huge asset, strength and advantage, can give it a position distinguishing it from other similar companies in the hierarchy and properly determine its place on the market. Information possessed by a commercial organisation is its strength and driving force, while the lack of a definition of significant information within an organisation represents its weakness [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schermerhorn, J. R. (2012). Management. Hoboken: Wiley.

    Google Scholar 

  2. Ogiela, M. R., & Ogiela, U. (2009). Secure information splitting using grammar schemes. Studies in Computational Intelligence, 244, 327–336. Springer, Berlin/Heidelberg.

    Article  Google Scholar 

  3. Ogiela, M. R., & Ogiela, U. (2009). Shadow generation protocol in linguistic threshold schemes. Communication in Computer and Information Science, 58, 35–42. Springer, Berlin/Heidelberg.

    Article  Google Scholar 

  4. Haag, S., & Cummings, M. (2012). Management information systems for the information age. Irwin: McGraw-Hill.

    Google Scholar 

  5. Krcmar, H. (2006). Information management. Springer.

    Google Scholar 

  6. O’Brien, J., & Marakas, G. (2010). Management information systems. Irwin: McGraw-Hill.

    Google Scholar 

  7. Ogiela, L. (2009). UBIAS systems for cognitive interpretation and analysis of medical images. Opto-Electronics Review, 17(2), 166–179.

    Article  Google Scholar 

  8. Ogiela, M. R., & Ogiela, U. (2010). The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers & Mathematics with Applications, 60(2), 267–271.

    Article  MathSciNet  MATH  Google Scholar 

  9. Ogiela, M. R., & Ogiela, U. (2012). Linguistic protocols for secure information management and sharing. Computers & Mathematics with Applications, 63(2), 564–572.

    Article  MathSciNet  Google Scholar 

  10. Ogiela, M. R., & Ogiela, U. (2008). Linguistic extension for secret sharing (m, n)-threshold schemes. In: SecTech 2008–2008 International Conference on Security Technology, December 13–15, 2008 (pp. 125–128), Hainan Island, Sanya.

    Google Scholar 

  11. Menezes, A., van Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography. Waterloo: CRC Press.

    Google Scholar 

  12. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.

    MATH  Google Scholar 

  13. Ogiela, M. R., & Ogiela, U. (2009). Security of linguistic threshold schemes in multimedia systems. Studies in Computational Intelligence, 226, 13–20. Springer, Berlin/Heidelberg.

    Article  Google Scholar 

  14. Ogiela, M. R., & Ogiela, U. (2010). Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, 6059, 175–182.

    Article  Google Scholar 

  15. Ogiela, M. R., & Ogiela, U. (2012). DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management, 32, 175–181.

    Article  Google Scholar 

  16. Asmuth, C., & Bloom, J. (1983). A modular approach to key safeguarding. IEEE Transactions on Information Theory, 29, 208–210.

    Article  MathSciNet  Google Scholar 

  17. Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.

    Article  MathSciNet  MATH  Google Scholar 

  18. Ateniese, G., Blundo, C., de Santis, A., & Stinson, D. R. (1996). Constructions and bounds for visual cryptography. Lecture Notes in Computer Science, 1099, 416–428.

    Article  Google Scholar 

  19. Beguin, P., & Cresti, A. (1995). General short computational secret sharing schemes. Lecture Notes in Computer Science, 921, 194–208.

    Article  Google Scholar 

  20. Beimel, A., & Chor, B. (1994). Universally ideal secret sharing schemes. IEEE Transactions on Information Theory, 40, 786–794.

    Article  MathSciNet  MATH  Google Scholar 

  21. Berners-Lee, T., Fensel, D., Hendler, J. A., Lieberman, H., & Wahlster, W. (Eds.). (2005). Spinning the semantic web: Bringing the World Wide Web to its full potential. Cambridge: The MIT Press.

    Google Scholar 

  22. Blakley, G. R. (1979). Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 48, 313–317.

    Google Scholar 

  23. Cellary, W. (2007). Globalization from the information and communication perspective. Lecture Notes in Computer Science, 4882, 283–292.

    Article  Google Scholar 

  24. Cellary, W., Wiza, W., & Walczak, K. (2004). Visualizing web search results in 3D. Computer, 37(5), 87–89.

    Article  Google Scholar 

  25. Chomsky, N. (1957). Syntactic structures. London: Mouton.

    Google Scholar 

  26. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469–472.

    Article  MathSciNet  MATH  Google Scholar 

  27. Hang, N., & Zhao, W. (2007). Privacy-preserving data mining systems. Computer, 40(4), 52–58.

    Article  Google Scholar 

  28. Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45–53.

    Article  Google Scholar 

  29. Karnin, E. D., Greene, J. W., & Hellman, M. E. (1983). On sharing secret systems. IEEE Transactions on Information Theory, 29, 35–41.

    Article  MathSciNet  MATH  Google Scholar 

  30. Ladley, J. (2010). Making enterprise information management (EIM) work for business: A guide to understanding information as an asset. Burlington: Morgan Kaufman.

    Google Scholar 

  31. Mackenzie, O. J. (Ed.). (2006). Information science and knowledge management. Berlin: Springer.

    Google Scholar 

  32. Martin, K. M. (1993). Untrustworthy participants in perfect secret sharing schemes (Cryptography and coding III, pp. 255–264). Oxford: Clarendon.

    Google Scholar 

  33. Ogiela, L., & Ogiela, M. R. (2009). Cognitive techniques in visual data interpretation (Studies in computational intelligence, Vol. 228). Berlin/Heidelberg: Springer.

    Book  Google Scholar 

  34. Ogiela, L., & Ogiela, M. R. (2012). Advances in cognitive information systems (Cognitive systems monographs, Vol. 17). Berlin/Heidelberg: Springer.

    Book  MATH  Google Scholar 

  35. Ogiela, M. R., & Ogiela, U. (2008). Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, December 13–15, 2008 (Vol. 1, pp. 377–380), Hainan Island.

    Google Scholar 

  36. Okamoto, T. (1990). A fast signature scheme based on congruential polynomial operations. IEEE Transactions on Information Theory, 1, 47–53.

    Article  Google Scholar 

  37. Ong, H., Schnorr, C. P., & Shamir, A. (1985). Efficient signature schemes based on polynomial equations. In: Advances in Cryptology Proceedings of CRYPTO’84 (pp. 37–46). New York: Springer.

    Google Scholar 

  38. Reynolds, G. (2009). Information technology for managers. Boston: Course Technology.

    Google Scholar 

  39. Seberry, J., & Pieprzyk, J. (1989). Cryptography: An introduction to computer security. Englewood Cliffs: Prentice-Hall.

    MATH  Google Scholar 

  40. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.

    Article  MathSciNet  MATH  Google Scholar 

  41. Shannon, C. E. (1945). A mathematical theory of cryptography. Bell Telephone Labs

    Google Scholar 

  42. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal

    Google Scholar 

  43. Simmons, G. J. (1992). An introduction to shared secret and/or shared control schemes and their application. In Contemporary cryptology: The science of information integrity (pp. 441–497). Piscataway: IEEE Press.

    Google Scholar 

  44. Simmons, G. J. (1994). Subliminal channels: Past and present. European Transactions on Telecommunications, 5, 459–473.

    Article  Google Scholar 

  45. Simmons, G. J. (1993). The subliminal channels of the US digital signature algorithm (DSA). In: Proceedings of the Third Symposium on State and Progress of Research in Cryptography (pp. 35–54), Rome.

    Google Scholar 

  46. Tang, S. (2004). Simple secret sharing and threshold RSA signature schemes. Journal of Information and Computational Science, 1, 259–262.

    Google Scholar 

  47. Tipton, H. F. (2007). Information security management handbook. Boca Raton: Auerbach.

    MATH  Google Scholar 

  48. Tompa, M., & Woll, H. (1988). How to share a secret with cheaters. Journal of Cryptology, 2, 133–138.

    MathSciNet  Google Scholar 

  49. van Dijk, M. (1995). On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography, 6, 143–169.

    Article  MATH  Google Scholar 

  50. Wang, S. J., Tsai, Y. R., & Chen, P. Y. (2007). Proactive (k, n) threshold secret sharing scheme with variant k and n. In: Proceedings of the IPC 2007 – The 2007 International Conference on Intelligent Pervasive Computing (pp. 117–120), October 11–13th, 2007. Jeju Island.

    Google Scholar 

  51. Ward, J., Griffiths, P., & Whitemore, P. (1992). Strategic planning for information systems. Chichester: Wiley.

    Google Scholar 

  52. Whitman, M. E., & Mattord, H. J. (2010). Management of information security. Boston: Course Technology.

    Google Scholar 

  53. Wu, T. C., & He, W. H. (1995). A geometric approach for sharing secrets. Computers and Security, 14, 135–146.

    Article  Google Scholar 

  54. Zheng, Y., Hardjono, T., & Seberry, J. (1994). Reusing shares in secret sharing schemes. Computer, 37, 199–205.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Ogiela, M.R., Ogiela, U. (2014). Methodological Aspects of Information Sharing and Management in Organizations. In: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-5016-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5016-9_6

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5015-2

  • Online ISBN: 978-1-4471-5016-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics