Efficiency of Strategic Data Sharing and Management Protocols

In this paper will be presented some security features of biometric and linguistic threshold schemes, as well as efficiency evaluation features for such protocols. Possible application of presented algorithms will be described with future directions in the area of strategic information management. Secret splitting algorithms play an important role in securing strategic data or information. Thus innovative approaches called biometric threshold schemes and linguistic threshold schemes will be summarized with presentation of theirs efficiency results.

[1]  Doreen Meier,et al.  An Introduction To Management Science Quantitative Approaches To Decision Making , 2016 .

[2]  Marek R. Ogiela,et al.  Cognitive systems for intelligent business information management in cognitive economy , 2014, Int. J. Inf. Manag..

[3]  Marek R. Ogiela,et al.  Security of Linguistic Threshold Schemes in Multimedia Systems , 2009, KES IIMSS.

[4]  Lidia Ogiela,et al.  Semantic analysis and biological modelling in selected classes of cognitive information systems , 2013, Math. Comput. Model..

[5]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[6]  M.R. Ogiela,et al.  Linguistic Extension for Secret Sharing (m, n)-Threshold Schemes , 2008, 2008 International Conference on Security Technology.

[7]  Marek R. Ogiela,et al.  Shadow Generation Protocol in Linguistic Threshold Schemes , 2009, FGIT-SecTech.

[8]  Lidia Ogiela,et al.  Data management in cognitive financial systems , 2013, Int. J. Inf. Manag..

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Marek R. Ogiela,et al.  Cognitive systems and bio-inspired computing in homeland security , 2014, J. Netw. Comput. Appl..

[11]  Marek R. Ogiela,et al.  Semantic Analysis Processes in Advanced Pattern Understanding Systems , 2011 .

[12]  Dennis J. Sweeney,et al.  Study guide to accompany an introduction to management science : quantitative approaches to decision making , 1985 .

[13]  Makoto Takizawa,et al.  Personalized cryptography in cognitive management , 2017, Soft Comput..

[14]  Marek R. Ogiela,et al.  Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data , 2012, J. Electronic Imaging.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .