Skip to main content

Secure Information Management in Hierarchical Structures

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 195))

Abstract

Algorithms for information hiding and sharing are often used in intelligent data management. The great significance of information sharing may depend on its nature and importance for the institution concerned. In this paper we will present algorithms for multi-level information management and sharing. Such techniques will be based on the linguistic formalisms and sequential grammars. Presented approach may be treated as a secure enhancement of classical secret sharing procedures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering. Wiley, Indianapolis (2010)

    Google Scholar 

  2. Ogiela, M.R., Ogiela, U.: The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers and Mathematics with Applications 60(2), 267–271 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  3. Seberry, J., Pieprzyk, J.: Cryptography: An Introduction to Computer Security. Prentice-Hall, Englewood Cliffs (1989)

    MATH  Google Scholar 

  4. Shamir, A.: How to Share a Secret. Communications of the ACM, 612–613 (1979)

    Google Scholar 

  5. Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259–262 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ogiela, M.R., Ogiela, U. (2011). Secure Information Management in Hierarchical Structures. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Computer Science and Information Technology. AST 2011. Communications in Computer and Information Science, vol 195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24267-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24267-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24266-3

  • Online ISBN: 978-3-642-24267-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics