Cognitive Systems for Service Management in Cloud Computing

This paper presents topic of cognitive systems dedicated to management processes. In this paper will be described the cryptographic techniques dedicated to sharing processes with cognitive interpretation stages. Also, safety analysis of these methods will be described. Such algorithms will be presented especially in Cloud Computing context. This solution allow protecting confidential information, and performing secure operation for different kinds of information.

[1]  Urszula Ogiela,et al.  Classification of Cognitive Service Management Systems in Cloud Computing , 2017, BWCCA.

[2]  Lidia Ogiela Advanced techniques for knowledge management and access to strategic information , 2015, Int. J. Inf. Manag..

[3]  Lidia Ogiela,et al.  Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[6]  Marek R. Ogiela,et al.  Secure Information Management in Hierarchical Structures , 2011 .

[7]  Marek R. Ogiela,et al.  Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Stephen Grossberg,et al.  Adaptive Resonance Theory: How a brain learns to consciously attend, learn, and recognize a changing world , 2013, Neural Networks.

[10]  Lidia Ogiela,et al.  Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..

[11]  Tomoya Enokido,et al.  Flexible Synchronization Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems , 2017, CISIS.

[12]  Marek R. Ogiela,et al.  Bio-Inspired Cryptographic Techniques in Information Management Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[13]  Amos Beimel,et al.  Secret-Sharing Schemes for Very Dense Graphs , 2014, Journal of Cryptology.

[14]  Lidia Ogiela,et al.  Towards cognitive economy , 2014, Soft Comput..