Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Advanced techniques for computer sharing and management of strategic data

2013/09/B/HS4/00501

Keywords:

algorithms for information sharing strategic information secret data data management

Descriptors:

  • HS4_8: Behavioral economics, consumption and consumer behavior, marketing
  • HS4_10: Human resource management, employment and salaries
  • HS4_15: Land management, urban studies

Panel:

HS4 - Individuals, institutions, markets: economics, finance, management, demography, social and economic geography, urban studies

Host institution :

Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie, Wydział Zarządzania

woj. małopolskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr Lidia Ogiela 

Number of co-investigators in the project: 3

Call: OPUS 5 - announced on 2013-03-15

Amount awarded: 482 320 PLN

Project start date (Y-m-d): 2014-02-06

Project end date (Y-m-d): 2017-07-05

Project duration:: 41 months (the same as in the proposal)

Project status: Project settled

Equipment purchased [PL]

  1. Zakup komputera (laptopa) i drukarki z niezbędnym oprogramowaniem (10 000 PLN)

Information in the final report

  • Publication in academic press/journals (8)
  • Articles in post-conference publications (13)
  • Book publications / chapters in book publications (5)
  1. Intelligent techniques for secure financial management in cloud computing
    Authors:
    Lidia Ogiela
    Academic press:
    Electronic Commerce Research and Applications (rok: 2015, tom: 14, strony: 456-464), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.elerap.2015.07.001 - link to the publication
  2. Personal Information in Startegic Data Sharing and Communication Protocols
    Authors:
    Lidia Ogiela, Marek R. Ogiela
    Academic press:
    Lecture Notes on Information Theory (rok: 2015, tom: vol. 3 (2), strony: 75-80), Wydawca: LNIT
    Status:
    Published
    DOI:
    10.18178/lnit.3.2.75-80 - link to the publication
  3. Personalized cryptography in cognitive management
    Authors:
    Lidia Ogiela, Makoto Takizawa
    Academic press:
    Soft Computing (rok: 2017, tom: 21, strony: 2451-2464), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s00500-017-2546-2 - link to the publication
  4. Advanced techniques for knowledge management and access to strategic information
    Authors:
    Lidia Ogiela
    Academic press:
    International Journal of Information Management (rok: 2015, tom: 35, strony: 154-159), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.ijinfomgt.2014.11.006 - link to the publication
  5. Cryptographic techniques of strategic data splitting and secure information management
    Authors:
    Lidia Ogiela
    Academic press:
    Pervasive and Mobile Computing (rok: 2016, tom: 29, strony: 130-141), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.pmcj.2015.05.007 - link to the publication
  6. New paradigms of cognitive management extending computational intelligence approaches
    Authors:
    Lidia Ogiela, Urszula Ogiela
    Academic press:
    Annals of Operations Research (rok: 2018, tom: 265, strony: 293-304), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s10479-016-2395-x - link to the publication
  7. Secure Distribution Protocol for Restoring Information with Different Accesing Grants
    Authors:
    Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
    Academic press:
    Research Briefs on Information & Communication Technology Evolution (ReBICTE) (rok: 2015, tom: vol. 1, strony: 45299), Wydawca: Innovative Information Science & Technology Research Group
    Status:
    Published
  8. Insider Threats and Cryptographic Techniques in Secure Information Management
    Authors:
    Lidia Ogiela, Marek R. Ogiela
    Academic press:
    IEEE Systems Journal (rok: 2017, tom: 11, strony: 405-414), Wydawca: IEEE Systems Council
    Status:
    Published
    DOI:
    10.1109/JSYST.2015.2409213 - link to the publication
  1. Information Security in Intelligent Data Management Processes
    Authors:
    Lidia Ogiela, Urszula Ogiela
    Conference:
    Tenth International Conference on Broadband and Wireless Computing, Communication and Applications - BWCCA 2015 (rok: 2015, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 4-6 November
    Status:
    Published
  2. Intelligent Bio-inspired Approach for Secrecy Management in the Cloud
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Conference:
    2013 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (rok: 2014, ), Wydawca: CPS Conference Publishing Services
    Data:
    konferencja 08-10 November
    Status:
    Published
  3. Biometric Methods for Advanced Strategic Data Sharing Protocols
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Conference:
    Ninth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing - IMIS 2015 (rok: 2015, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 8-10 July
    Status:
    Published
  4. Efficiency of strategic data sharing and management protocols
    Authors:
    Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
    Conference:
    2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (rok: 2016, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 6-8 July
    Status:
    Published
  5. Bio-Inspired Cryptographic Techniques in Information Management Applications
    Authors:
    Lidia Ogiela, Marek R. Ogiela
    Conference:
    2016 IEEE 30th International Conference on Advanced Information Networking and Applications (rok: 2016, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 23-25 March
    Status:
    Published
  6. Bio-inspired Approaches for Secret Data Sharing Techniques
    Authors:
    Marek R. Ogiela, Lidia Ogiela
    Conference:
    International Conference on Intelligent Informatics and BioMedical Sciences (rok: 2015, ), Wydawca: IEEE Computer Society
    Data:
    konferencja November 28-30
    Status:
    Published
  7. Cognitive Information Systems in Secure Information Management and Personalized Cryptography
    Authors:
    Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
    Conference:
    The 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems (rok: 2014, ), Wydawca: IEEE
    Data:
    konferencja 03-06 December
    Status:
    Published
  8. Cryptographic Techniques in Advanced Information Management
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Conference:
    2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (rok: 2014, ), Wydawca: CPS Conference Publishing Services
    Data:
    konferencja 02-04 July
    Status:
    Published
  9. On using Cognitive Models in Cryptography
    Authors:
    Marek R. Ogiela, Lidia Ogiela
    Conference:
    2016 IEEE 30th International Conference on Advanced Information Networking and Applications (rok: 2016, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 23-25 March
    Status:
    Published
  10. Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data
    Authors:
    Lidia Ogiela, Marek R. Ogiela, Makoto Takizawa
    Conference:
    2017 IEEE 31st International Conference on Advanced Information Networking and Applications (rok: 2017, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 27-29 March
    Status:
    Published
  11. Security and Privacy in Distributed Information Management
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Conference:
    2014 International Conference on Intelligent Networking and Collaborative Systems (rok: 2014, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 10-12 September
    Status:
    Published
  12. Biometric Extensions for Secret Sharing Protocols
    Authors:
    Lidia Ogiela, Marek R. Ogiela
    Conference:
    International Conference on Information Science and Security (rok: 2015, ), Wydawca: IEEE Computer Society
    Data:
    konferencja December 14-16
    Status:
    Published
  13. Secure Information and Services Management in the Cloud
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Conference:
    ICAS 2015 The Eleventh International Conference on Autonomic and Autonomous Systems (rok: 2015, ), Wydawca: IARIA
    Data:
    konferencja May 24-29
    Status:
    Published
  1. Advanced Techniques for Computer Sharing and Management of Strategic Data
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Book:
    Information and Communication Technology (rok: 2014, tom: 8407, strony: 521-525), Wydawca: Springer
    Status:
    Published
  2. Crypto-Biometric Models for Information Secrecy
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Book:
    Availability, Reliability and Security in Information Systems (rok: 2014, tom: 8708, strony: 172-178), Wydawca: Springer
    Status:
    Published
  3. Protocol for Detection Counterfeit Transactions in Electronic Currency Exchange
    Authors:
    Marek R. Ogiela, Piotr Sułkowski
    Book:
    Cryptography and Security Systems (rok: 2014, tom: 448, strony: 145-152), Wydawca: Springer-Verlag
    Status:
    Published
  4. Comparison of Biometric and Linguistic Secret Sharing Protocols
    Authors:
    Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
    Book:
    Advances on Broad-Band Wireless Computing, Communication and Applications (rok: 2017, tom: 2, strony: 501-505), Wydawca: Springer
    Status:
    Published
  5. Security in Management of Distributed Information
    Authors:
    Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
    Book:
    Ubiquitous Computing Application and Wireless Sensor (rok: 2015, tom: 331, strony: 457-462), Wydawca: Springer Science+Business Media Dordrecht
    Status:
    Published