User Oriented Protocols for Data Sharing and Services Management

  • Lidia OgielaEmail author
  • Makoto Takizawa
  • Urszula Ogiela
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1036)


In this paper will be presented a new user-oriented approach for creation of cryptographic protocols dedicated for efficient and secure data sharing and services management. Such new procedures will be proposed with application of mathematical linguistic formalisms and application of personal characteristics, involved in creation of the division and management procedures. Such new protocols can be created with application of different data representation classes. Some possible application will also be described.


Data sharing Service management User oriented protocols 



This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

This work was supported by JSPS KAKENHI grant number 15H0295.


  1. 1.
    Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)Google Scholar
  2. 2.
    Laudon, K.C., Laudon, J.P.: Management Information Systems – Managing the Digital Firm, 7th edn. Prentice-Hall International Inc., Cliffs (2002)zbMATHGoogle Scholar
  3. 3.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)zbMATHGoogle Scholar
  4. 4.
    Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manage. 35(2), 154–159 (2015)CrossRefGoogle Scholar
  5. 5.
    Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130–141 (2016)CrossRefGoogle Scholar
  6. 6.
    Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11(2), 405–414 (2017)CrossRefGoogle Scholar
  7. 7.
    Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol. 244, pp. 327–336. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  8. 8.
    Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Heidelberg (2018). Scholar
  10. 10.
    Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, New York (2013)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Pedagogical University of KrakowKrakówPoland
  2. 2.Department of Advanced SciencesHosei UniversityTokyoJapan

Personalised recommendations