Secure Information Management Using Linguistic Threshold Approach
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confident
- PDF / 7,187,602 Bytes
- 147 Pages / 439.42 x 683.15 pts Page_size
- 93 Downloads / 204 Views
Marek R. Ogiela Urszula Ogiela
Secure Information Management Using Linguistic Threshold Approach
Secure Information Management Using Linguistic Threshold Approach
Advanced Information and Knowledge Processing Series Editors Professor Lakhmi C. Jain [email protected] Professor Xindong Wu [email protected] Editorial Board Farokh Bastani, University of Dallas, USA John K Debenham, University of Technology, Sydney, Australia Stephen Grossberg, Boston University, USA Philip S Yu, University of Illinois, Chicago, USA M Tamer Özsu, University of Waterloo, Canada Tetsushi Nishida, University of Tokyo, Japan Ning Zhong, Maebashi Institute of Technology, Japan
For further volumes: http://www.springer.com/series/4738
Marek R. Ogiela • Urszula Ogiela
Secure Information Management Using Linguistic Threshold Approach
Marek R. Ogiela AGH University of Science and Technology Kraków, Poland
Urszula Ogiela AGH University of Science and Technology Kraków, Poland
ISSN 1610-3947 ISBN 978-1-4471-5015-2 ISBN 978-1-4471-5016-9 (eBook) DOI 10.1007/978-1-4471-5016-9 Springer London Heidelberg New York Dordrecht Library of Congress Control Number: 2013947086 © Springer-Verlag London 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
We dedicate this book to our Mom, Izydo
Data Loading...