2011
DOI: 10.1007/978-3-642-24267-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Secure Information Management in Hierarchical Structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…The proper answer in such cases is only available for trusted users having experiences or expert knowledge from this particular area. Such semantic verification procedures can be connected with management protocols which operate in distributed structures and allow user selective authentication using semantic or knowledge‐based content …”
Section: Multilevel Authentication Codes Using Expert Knowledgementioning
confidence: 99%
“…The proper answer in such cases is only available for trusted users having experiences or expert knowledge from this particular area. Such semantic verification procedures can be connected with management protocols which operate in distributed structures and allow user selective authentication using semantic or knowledge‐based content …”
Section: Multilevel Authentication Codes Using Expert Knowledgementioning
confidence: 99%
“…Protecting any kind of information from unauthorized access has been a subject of security research for many years and numerous schemes have been developed over time to secure strategic data and transactions from several menaces, ranging from insider threats to common attacks to authentication mechanisms and infrastructures . The diffusion of new smart devices is creating new opportunities and opening new perspectives for developing new enhanced and more usable authentication schemes, which will be better capable to face these challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Data splitting and sharing algorithms have been developed for many years with a view to store and distribute secret data in a safe manner. 1,2,[4][5][6][7][8][9][10][11][12][13][14][15] The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic 12,[14][15][16][17] and biometric threshold schemes.…”
Section: Introductionmentioning
confidence: 99%
“…A new class of data sharing algorithms is combining the solutions presented above to develop linguistic-biometric threshold schemes. This class of schemes has been described in other studies, 4,5,[9][10][11][12][13][14][15][16][17] and they are used for the data protection processes, taking into consideration the layers of semantic meaning of the secret as well as the dedicated shadow allocation, executable by means of such biometric techniques.…”
Section: Introductionmentioning
confidence: 99%