Advanced techniques for knowledge management and access to strategic information

被引:39
作者
Ogiela, Lidia [1 ]
机构
[1] AGH Univ Sci & Technol, PL-30059 Krakow, Poland
关键词
Knowledge management; Strategic information; Cryptographic algorithms; Secret sharing; SYSTEMS;
D O I
10.1016/j.ijinfomgt.2014.11.006
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This publication discusses advanced knowledge management techniques based on information splitting and sharing algorithms for secret, strategic information. Information splitting techniques will be dedicated to problems of secure information storage and managing sets of strategic data. The management of strategic corporate/organisational data will provide the illustration of the discussion of knowledge management which constitutes the starting point for advanced information management processes. Advanced knowledge management techniques will be discussed using the example of applying cryptographic algorithms in processes of managing information and access to it. Restricted access to strategic corporate information means that this type of data must be stored securely and must not be disclosed to unauthorised individuals. The use of cryptographic algorithms for strategic information sharing keeps this data completely confidential and ensures no access of unauthorised people to the knowledge possessed. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:154 / 159
页数:6
相关论文
共 21 条
[11]   Semantic analysis and biological modelling in selected classes of cognitive information systems [J].
Ogiela, Lidia .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) :1405-1414
[12]   Data management in cognitive financial systems [J].
Ogiela, Lidia .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (02) :263-270
[13]  
Ogiela L, 2011, COMM COM INF SC, V195, P26
[14]  
Ogiela L, 2008, LECT NOTES ARTIF INT, V5314, P456, DOI 10.1007/978-3-540-88513-9_49
[15]   DNA-like linguistic secret sharing for strategic information systems [J].
Ogiela, Marek R. ;
Ogiela, Urszula .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2012, 32 (02) :175-181
[16]   The use of mathematical linguistic methods in creating secret sharing threshold algorithms [J].
Ogiela, Marek R. ;
Ogiela, Urszula .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) :267-271
[17]  
Ogiela MR, 2014, ADV INFORM KNOWL PRO, P1, DOI 10.1007/978-1-4471-5016-9
[18]  
Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[19]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[20]  
TalebiFard P., 2011, J WIRELESS MOBILE NE, V2, P19