مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 7 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Cognitive cryptography techniques for intelligent information management |
ترجمه عنوان مقاله | تکنیک های رمزنگاری شناختی برای مدیریت اطلاعات هوشمند |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی فناوری اطلاعات، کامپیوتر |
گرایش های مرتبط | مهندسی نرم افزار و امنیت اطلاعات |
مجله | مجله بین المللی مدیریت اطلاعات – International Journal of Information Management |
دانشگاه | AGH University of Science and Technology – Poland |
کلمات کلیدی | مدیریت اطلاعات هوشمند، رمزنگاری شناختی، اطلاعات معنایی و شخصی، اشتراک گذاری داده ها |
کلمات کلیدی انگلیسی | Intelligent information management, Cognitive cryptography, Semantic and personal information, Data sharing |
کد محصول | E6656 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
Cryptographic techniques are used to secure information and restrict access to it. Securing the information is mainly aimed at protecting it from theft. This theft is understood as the ability of unauthorised individuals (systems) to access information and use it (Menezes, van Oorschot, & Vanstone, 2001; Ogiela, 2016; Schneier, 1996). Every piece of information is thus subject to protection whose level depends on the important message (data) contained in this information. It is, however, worth noting that in the case of information which is in public domain, this information is not subject to any special security, but if it has to be protected, cryptographic protocols can be used for this purpose. In the case of data that is confidential, secret or strategic, it is necessary to use data protection algorithms to verify the individuals having access to this data. Cryptographic algorithms are among those that are to ensure the appropriate security and protection of information (Beimel et al. 2016; Ogiela, 2015b; Ogiela & Ogiela, 2008, 2011, 2014; Tang, 2004). They are considered secure if their use ensures the complete protection of data. Data security is a necessary element in the operation of various information exchange processes. These processes can include, for instance, the exchange of information between: • parties to or participants of a process – the exchange of information between various individuals who participate in the data/information exchange process, • sites where process participants are located – the exchange of information between different places in which parties to the process are situated, such as company branches, representative offices, remote sites, • process participants, but at different points in time – creating copies of information which will be reproduced after a certain period of time has expired. In all the above situations, the complexity of the process of exchanging information between parties to the protocol should be accounted for as well (Shamir, 1979; TalebiFard & Leung, 2011). This is because there are single, simple information exchange protocols, and protocols dedicated to complex ranges of users, such as information splitting and sharing. These kinds of solutions are designed for securing data by splitting it and distributing parts of this split information (the so-called shadows) among a selected group of secrets trustees. This information is not stored by one protocol participant whose action would depend only on their own decisions, but is distributed among a specific group of participants (individuals, computers), who should act rationally as a group. This means that if a decision needs to be taken, a group of secret trustees must work in concert, and in addition: • intent to disclose the secret in a situation in which its contents need to be disclosed, • guard the secret if its security is threatened. Any action aimed at operating contrary to the other participants may cause: • disclosing secret information in a situation in which it should not have been, • no access to the information when its disclosure has a priority, overriding nature. |