Information Security Management Based on Linguistic Sharing Techniques

Information Security Management Based on Linguistic Sharing Techniques

Marek R. Ogiela (AGH University of Science and Technology, Poland) and Urszula Ogiela (AGH University of Science and Technology, Poland)
DOI: 10.4018/978-1-4666-0978-5.ch009
OnDemand PDF Download:
No Current Special Offers


Secure information splitting is used in many tasks of the intelligent sharing of secrets and key data in business organisations. The significance of information splitting depends on its nature, while the significance of information sharing may depend on its importance and the meaning it has for the organisation or institution concerned. This chapter presents models for multi-level information splitting and information management with the use of the linguistic approach and formal grammars. Such methods constitute a secure enhancement of traditional secret splitting algorithms and introduce an additional stage at which information is coded using the appropriately defined regular or context-free grammar. The many possible applications of such methods include their use for the intelligent management of important or confidential information in government institutions or businesses. Algorithms of multi-level information splitting allow information that is not available to all employees of a given organisation or its environment to be securely split or shared.
Chapter Preview

Information Management Methods

Today, information management processes are found in all types of organizations, which carry out various operating processes and management functions. This is because data acquisition and collection processes depend on, and are strongly correlated with, the constant development of information technology, serving inter alia to collect, analyze and transmit the processed information.

Information is now managed at all levels of the organization, and has the form of a set of rules, techniques, systems and devices which define the information/communication structure of the enterprise. Key information management tasks within an enterprise include:

  • Planning, designing and implementing the institution's information strategy;

  • Controlling information flows through the communication network;

  • Planning capital expenses for developing information systems;

  • Ensuring the effective operation of information systems;

  • Information quality management;

  • Creating conditions to keep the collected information secure (defining rights to access information);

  • Ensuring effective forms of training and development for the IT staff and system users;

  • Creating conditions for the institution or enterprise to have effective links to the information market;

  • Integrating information systems used at various levels.

Complete Chapter List

Search this Book: