Secure Information Management in Hierarchical Structures

  • Marek R. Ogiela
  • Urszula Ogiela
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 195)


Algorithms for information hiding and sharing are often used in intelligent data management. The great significance of information sharing may depend on its nature and importance for the institution concerned. In this paper we will present algorithms for multi-level information management and sharing. Such techniques will be based on the linguistic formalisms and sequential grammars. Presented approach may be treated as a secure enhancement of classical secret sharing procedures.


intelligent information management threshold schemes cryptographic protocols 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering. Wiley, Indianapolis (2010)Google Scholar
  2. 2.
    Ogiela, M.R., Ogiela, U.: The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers and Mathematics with Applications 60(2), 267–271 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Seberry, J., Pieprzyk, J.: Cryptography: An Introduction to Computer Security. Prentice-Hall, Englewood Cliffs (1989)zbMATHGoogle Scholar
  4. 4.
    Shamir, A.: How to Share a Secret. Communications of the ACM, 612–613 (1979)Google Scholar
  5. 5.
    Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259–262 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Marek R. Ogiela
    • 1
  • Urszula Ogiela
    • 1
  1. 1.AGH University of Science and TechnologyKrakówPoland

Personalised recommendations