Secure Information Management Using Linguistic Threshold Approach:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Springer
2014
|
Schriftenreihe: | Advanced Information and Knowledge Processing
|
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 136 p.) Ill. |
ISBN: | 9781447150169 |
DOI: | 10.1007/978-1-4471-5016-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV041728638 | ||
003 | DE-604 | ||
005 | 20150224 | ||
007 | cr|uuu---uuuuu | ||
008 | 140311s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781447150169 |c Online |9 978-1-4471-5016-9 | ||
024 | 7 | |a 10.1007/978-1-4471-5016-9 |2 doi | |
035 | |a (OCoLC)858032596 | ||
035 | |a (DE-599)BVBBV041728638 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-355 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Ogiela, Marek R. |d 1968- |e Verfasser |0 (DE-588)1043005986 |4 aut | |
245 | 1 | 0 | |a Secure Information Management Using Linguistic Threshold Approach |c Marek R. Ogiela, Urszula Ogiela |
264 | 1 | |a London [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XIII, 136 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced Information and Knowledge Processing | |
533 | |a Online-Ausgabe |d 2013 |f Springer eBook Collection / Computer Science |7 s2013 | ||
650 | 0 | 7 | |a Technik |0 (DE-588)4059205-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wirtschaftswissenschaften |0 (DE-588)4066528-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sprachbarriere |0 (DE-588)4121706-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Technik |0 (DE-588)4059205-4 |D s |
689 | 0 | 3 | |a Wirtschaftswissenschaften |0 (DE-588)4066528-8 |D s |
689 | 0 | 4 | |a Sprachbarriere |0 (DE-588)4121706-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ogiela, Urszula |e Verfasser |4 aut | |
776 | 0 | 8 | |i Reproduktion von |a Ogiela, Marek R., 1968- |t Secure Information Management Using Linguistic Threshold Approach |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4471-5015-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4471-5016-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027175467 | ||
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4471-5016-9 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152010754228224 |
---|---|
adam_text | SECURE INFORMATION MANAGEMENT USING LINGUISTIC THRESHOLD APPROACH
/ OGIELA, MAREK R.
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PREFACE
INTRODUCTION
FIELDS OF APPLICATION, METHODS OF AND CURRENT TRENDS IN INFORMATION
MANAGEMENT
TYPES OF INFORMATION SPLITTING AND SHARING TECHNIQUES
MODEL OF MULTILEVEL INFORMATION SPLITTING AND MANAGEMENT IN AN
ORGANIZATION
PROPOSITION OF SHARING TECHNIQUES BASED ON THE MATHEMATICAL LINGUISTIC
APPROACH
METHODOLOGICAL ASPECTS OF INFORMATION SHARING AND MANAGEMENT IN
ORGANIZATIONS
FEATURES OF LINGUISTIC THRESHOLD SCHEMES
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURE INFORMATION MANAGEMENT USING LINGUISTIC THRESHOLD APPROACH
/ OGIELA, MAREK R.
: 2014
ABSTRACT / INHALTSTEXT
IN RECENT YEARS, CRYPTOGRAPHIC TECHNIQUES FOR PROTECTING AND HIDING
SECRET INFORMATION HAVE BEEN INCLUDED IN DIRECTIONS OF RESEARCH ON
INTELLIGENT INFORMATION MANAGEMENT. DATA CAN BE MANAGED SECURELY DUE TO
THE USE OF ALGORITHMS FOR ENSURING THE CONFIDENTIALITY OF DATA,
INFORMATION SPLITTING TECHNIQUES AS WELL AS PROTOCOLS FOR SHARING
INFORMATION AND METHODS OF ITS RECONSTRUCTION. THIS IS WHY TECHNIQUES OF
ADVANCED SPLITTING AND RECONSTRUCTION OF INFORMATION FORM THE PRIMARY
SUBJECT OF SECURE INFORMATION MANAGEMENT USING LINGUISTIC THRESHOLD
APPROACH, WHOSE MAIN PURPOSE IS TO DISCUSS THE SO-CALLED LINGUISTIC
THRESHOLD SCHEMES FOR INFORMATION SHARING. AN ATTEMPT IS ALSO MADE TO
DESCRIBE THE OPPORTUNITIES OF USING THESE TECHNIQUES TO CREATE NEW
MODELS OF MANAGING STRATEGIC INFORMATION SHARED WITHIN A COMMERCIAL
ORGANISATION OR A STATE INSTITUTION. SUCH INFORMATION IS SPECIALLY
PROTECTED, AND ITS CONTENTS ARE USED ONLY IF THE AUTHORISED USERS ARE
ENABLED TO ACCESS IT.THIS MONOGRAPH ATTEMPTS TO DEFINE A MODEL STRUCTURE
OF INFORMATION FLOW AND FOR ASSIGNING INFORMATION SHARES TO PARTICULAR
GROUPS OF INDIVIDUALS CONCERNED. THE PROPOSED INFORMATION FLOW MODEL CAN
BE INTEGRATED INTO PRACTICAL SOLUTIONS WITHIN ANY ORGANISATION OR
INSTITUTION, IMPROVING THE FUNCTIONALITY OF ITS LEGACY INFORMATION
SYSTEMS. THE USE OF STRONG MATHEMATICAL CRYPTOGRAPHIC MODELS TO MANAGE
INFORMATION CONSTITUTES A SCIENTIFIC INNOVATION AND A DEMONSTRATION OF
THE METHODS AND OPPORTUNITIES OF USING ADVANCED TECHNIQUES FOR
CONFIDENTIALLY EXCHANGING INFORMATION IN TASKS SUPPORTING DATA FLOW
WITHIN A COMMERCIAL ORGANISATION. THE INTERDISCIPLINARY NATURE OF THE
SOLUTIONS PROPOSED MEANS THAT THE SUBJECT OF LINGUISTIC THRESHOLD
SCHEMES FORMING PART OF INTELLIGENT INFORMATION MANAGEMENT BECOMES A NEW
CHALLENGE FOR THE RESEARCH AND APPLICATION WORK CARRIED OUT.THE AUTHORS
OF THIS MONOGRAPH HOPE THAT IT WILL GUIDE READERS ON AN INTERESTING
JOURNEY THROUGH THE CUTTING EDGE SOLUTION IN THE FIELD OF SECURE
INFORMATION MANAGEMENT
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Ogiela, Marek R. 1968- Ogiela, Urszula |
author_GND | (DE-588)1043005986 |
author_facet | Ogiela, Marek R. 1968- Ogiela, Urszula |
author_role | aut aut |
author_sort | Ogiela, Marek R. 1968- |
author_variant | m r o mr mro u o uo |
building | Verbundindex |
bvnumber | BV041728638 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)858032596 (DE-599)BVBBV041728638 |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4471-5016-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03887nmm a2200685 c 4500</leader><controlfield tag="001">BV041728638</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150224 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140311s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781447150169</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4471-5016-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4471-5016-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858032596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041728638</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ogiela, Marek R.</subfield><subfield code="d">1968-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1043005986</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Information Management Using Linguistic Threshold Approach</subfield><subfield code="c">Marek R. Ogiela, Urszula Ogiela</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 136 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced Information and Knowledge Processing</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="d">2013</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield><subfield code="7">s2013</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technik</subfield><subfield code="0">(DE-588)4059205-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wirtschaftswissenschaften</subfield><subfield code="0">(DE-588)4066528-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sprachbarriere</subfield><subfield code="0">(DE-588)4121706-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Technik</subfield><subfield code="0">(DE-588)4059205-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Wirtschaftswissenschaften</subfield><subfield code="0">(DE-588)4066528-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sprachbarriere</subfield><subfield code="0">(DE-588)4121706-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ogiela, Urszula</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Ogiela, Marek R., 1968-</subfield><subfield code="t">Secure Information Management Using Linguistic Threshold Approach</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4471-5015-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027175467</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4471-5016-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041728638 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:03:55Z |
institution | BVB |
isbn | 9781447150169 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027175467 |
oclc_num | 858032596 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 136 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series2 | Advanced Information and Knowledge Processing |
spelling | Ogiela, Marek R. 1968- Verfasser (DE-588)1043005986 aut Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela, Urszula Ogiela London [u.a.] Springer 2014 1 Online-Ressource (XIII, 136 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Advanced Information and Knowledge Processing Online-Ausgabe 2013 Springer eBook Collection / Computer Science s2013 Technik (DE-588)4059205-4 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Wirtschaftswissenschaften (DE-588)4066528-8 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Sprachbarriere (DE-588)4121706-8 gnd rswk-swf Informatik (DE-588)4026894-9 s Chiffrierung (DE-588)4352893-4 s Technik (DE-588)4059205-4 s Wirtschaftswissenschaften (DE-588)4066528-8 s Sprachbarriere (DE-588)4121706-8 s DE-604 Ogiela, Urszula Verfasser aut Reproduktion von Ogiela, Marek R., 1968- Secure Information Management Using Linguistic Threshold Approach 2014 Erscheint auch als Druckausgabe 978-1-4471-5015-2 https://doi.org/10.1007/978-1-4471-5016-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Ogiela, Marek R. 1968- Ogiela, Urszula Secure Information Management Using Linguistic Threshold Approach Technik (DE-588)4059205-4 gnd Chiffrierung (DE-588)4352893-4 gnd Wirtschaftswissenschaften (DE-588)4066528-8 gnd Informatik (DE-588)4026894-9 gnd Sprachbarriere (DE-588)4121706-8 gnd |
subject_GND | (DE-588)4059205-4 (DE-588)4352893-4 (DE-588)4066528-8 (DE-588)4026894-9 (DE-588)4121706-8 |
title | Secure Information Management Using Linguistic Threshold Approach |
title_auth | Secure Information Management Using Linguistic Threshold Approach |
title_exact_search | Secure Information Management Using Linguistic Threshold Approach |
title_full | Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela, Urszula Ogiela |
title_fullStr | Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela, Urszula Ogiela |
title_full_unstemmed | Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela, Urszula Ogiela |
title_short | Secure Information Management Using Linguistic Threshold Approach |
title_sort | secure information management using linguistic threshold approach |
topic | Technik (DE-588)4059205-4 gnd Chiffrierung (DE-588)4352893-4 gnd Wirtschaftswissenschaften (DE-588)4066528-8 gnd Informatik (DE-588)4026894-9 gnd Sprachbarriere (DE-588)4121706-8 gnd |
topic_facet | Technik Chiffrierung Wirtschaftswissenschaften Informatik Sprachbarriere |
url | https://doi.org/10.1007/978-1-4471-5016-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027175467&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ogielamarekr secureinformationmanagementusinglinguisticthresholdapproach AT ogielaurszula secureinformationmanagementusinglinguisticthresholdapproach |