2015
DOI: 10.1016/j.ijinfomgt.2014.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Advanced techniques for knowledge management and access to strategic information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
2

Year Published

2017
2017
2019
2019

Publication Types

Select...
7

Relationship

5
2

Authors

Journals

citations
Cited by 54 publications
(30 citation statements)
references
References 8 publications
0
28
0
2
Order By: Relevance
“…[13][14][15][16][17] In this chapter, the authors focus on discussing the topic of linguistic schemes for message sharing. The essence of the subject of the semantic analysis of data has been described inter alia in the publications.…”
Section: Linguistic Secret-sharing Schemesmentioning
confidence: 99%
“…[13][14][15][16][17] In this chapter, the authors focus on discussing the topic of linguistic schemes for message sharing. The essence of the subject of the semantic analysis of data has been described inter alia in the publications.…”
Section: Linguistic Secret-sharing Schemesmentioning
confidence: 99%
“…In this case, it is more appropriate to talk about the concept of "data consolidation", which in [9] is defined as "management of integration processes and data exchange between different production systems". Common definitions of information consolidation also include: "summarizing records for report preparation" [10]; "the process of information accumulation and structuring" [11]; "obtaining of systematically integrated information resources from various sources" [12]; "organization of management of sets of strategic corporative information" [13]. In this context, it is appropriate to take into consideration the proposal, contained in paper [14], in terms of the need to divide consolidation into physical and logical.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic and biometric threshold schemes …”
Section: Introductionmentioning
confidence: 99%