Innovative Protocols for Data Sharing and Cyber Systems Security

被引:0
|
作者
Ogiela, Urszula [1 ]
Takizawa, Makoto [2 ]
Ogiela, Lidia [3 ]
机构
[1] AGH Univ Sci & Technol, Cryptog & Cognit Informat Res Grp, 30 Mickiewicza Ave, PL-30059 Krakow, Poland
[2] Hosei Univ, Dept Adv Sci, 3-7-2 Kajino Cho, Koganei, Tokyo 1848584, Japan
[3] Pedag Univ Cracow, Inst Comp Sci, Podchorazych 2 St, PL-30084 Krakow, Poland
关键词
Cryptographic protocols; Data security; Cloud computing; Secure information management; CRYPTOGRAPHIC TECHNIQUES; MANAGEMENT;
D O I
10.1007/978-3-319-98530-5_37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper will be presented new classes of cryptographic secret sharing procedures dedicated for secure information division and transmission. In particular will be presented two classes of protocols, which allow to share information with application of grammar solutions, as well as personal or behavioral parameters. Some possible application of such technologies will also be presented especially with relation to secure data or services management in distributed structures or Cloud environment.
引用
收藏
页码:445 / 452
页数:8
相关论文
共 50 条
  • [31] Data Collection Method for Security Digital Twin on Cyber Physical Systems
    Doenhoff, Jens
    Tamura, Yu
    Tsuji, Daisuke
    Shigemoto, Tomohiro
    [J]. IEICE COMMUNICATIONS EXPRESS, 2022, 11 (12): : 829 - 834
  • [32] PROTOCOLS FOR DATA-SECURITY
    DEMILLO, R
    MERRITT, M
    [J]. COMPUTER, 1983, 16 (02) : 39 - 51
  • [33] Cyber Security of Cyber Physical Systems and Its Problems
    [J]. Journal of the Institute of Electrical Engineers of Japan, 2022, 142 (04): : 195 - 196
  • [34] A cloud-edge based data security architecture for sharing and analysing cyber threat information
    Chadwick, David W.
    Fan, Wenjun
    Costantino, Gianpiero
    de Lemos, Rogerio
    Di Cerbo, Francesco
    Herwono, Ian
    Manea, Mirko
    Mori, Paolo
    Sajjad, Ali
    Wang, Xiao-Si
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 710 - 722
  • [35] Security Protocols Against Cyber Attacks in the Distribution Automation System
    Lim, I. H.
    Hong, S.
    Choi, M. S.
    Lee, S. J.
    Kim, T. W.
    Lee, S. W.
    Ha, B. N.
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 448 - 455
  • [36] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Alahmari, Saad
    Renaud, Karen
    Omoronyia, Inah
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2023, 21 (01) : 123 - 158
  • [37] Moving beyond cyber security awareness and training to engendering security knowledge sharing
    Saad Alahmari
    Karen Renaud
    Inah Omoronyia
    [J]. Information Systems and e-Business Management, 2023, 21 : 123 - 158
  • [38] An Ensemble approach to Big Data Security (Cyber Security)
    Hashmani, Manzoor Ahmed
    Jameel, Syed Muslim
    Ibrahim, Aidarus M.
    Zaffar, Maryam
    Raza, Kamran
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 75 - 77
  • [39] Big Data Analytics for Cyber Security
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [40] Data Mining and Its Cyber Security
    Qiang, Xinjian
    Cheng, Guojian
    Xiao, Hong
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 218 - 221