Innovative Protocols for Data Sharing and Cyber Systems Security

被引:0
|
作者
Ogiela, Urszula [1 ]
Takizawa, Makoto [2 ]
Ogiela, Lidia [3 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
[2] Hosei Univ, Dept Adv Sci, 3-7-2 Kajino Cho, Koganei, Tokyo 1848584, Japan
[3] Pedag Univ Cracow, Inst Comp Sci, Podchorazych 2 St, PL-30084 Krakow, Poland
关键词
Cryptographic protocols; Data security; Cloud computing; Secure information management; CRYPTOGRAPHIC TECHNIQUES; MANAGEMENT;
D O I
10.1007/978-3-319-98530-5_37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper will be presented new classes of cryptographic secret sharing procedures dedicated for secure information division and transmission. In particular will be presented two classes of protocols, which allow to share information with application of grammar solutions, as well as personal or behavioral parameters. Some possible application of such technologies will also be presented especially with relation to secure data or services management in distributed structures or Cloud environment.
引用
收藏
页码:445 / 452
页数:8
相关论文
共 50 条
  • [1] Privacy Principles for Sharing Cyber Security Data
    Fisk, Gina
    Ardi, Calvin
    Pickett, Neale
    Heidemann, John
    Fisk, Mike
    Papadopoulos, Christos
    [J]. 2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 193 - 197
  • [2] Personal Data in Cyber Systems Security
    Ogiela, Marek R.
    Ogiela, Lidia
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2017, 2018, 611 : 174 - 180
  • [3] An Innovative Architecture for Supporting Cyber-Physical Security Systems
    Cuzzocrea, Alfredo
    Nolich, Massimiliano
    Ukovich, Walter
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT V, 2018, 10964 : 658 - 667
  • [4] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    [J]. CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [5] Security mechanisms and data access protocols in innovative wireless networks
    Pathan, Al-Sakib Khan
    Azad, Saiful
    Khan, Rasib
    Caviglione, Luca
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (09):
  • [6] Big Data In computer Cyber Security Systems
    AlMadahkah, Amani Mobarak
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 56 - 65
  • [7] Cyber Security of Industrial Communication Protocols
    Su, Weilian
    Antoniou, Anastasios
    Eagle, Chris
    [J]. 2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [8] On the scalability of Big Data Cyber Security Analytics systems
    Ullah, Faheem
    Babar, M. Ali
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198
  • [9] Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services
    Wang, Xiao-Si
    Herwono, Ian
    Di Cerbo, Francesco
    Kearney, Paul
    Shackleton, Mark
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [10] Towards Improved Cyber Security Information Sharing
    Dandurand, Luc
    Serrano, Oscar Serrano
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,