Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as an imperative equirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted nformation-sharing approach for government departments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of onfidential and top secret information amongst security ersonnels and government departments within the national oundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and overnment intelligence departments to avoid threatening activities. The experimental results demonstrate the ffectiveness of the proposed information sharing approach.
Authors and Affiliations
Md. Headayetullah , G. K. Pradhan
MOEMS Ring Resonators and Waveguides an Optical Approach
WDM networks use high speed MOEMS ring resonators. Due to the substrate loss the regular tuning of the rings is not possible, hence we need a specialized tuning element for the same. As the advantages increases so does t...
Evolutionary Aspects Of Windows Operating System To Enhance Existing Technology
The evolutionary trends in windows technology tends to hange since from the beginning including kernel, Graphical (GUI), Device drivers, interfaces etc. This paper presents a brief and comprehensive statistical analysis...
INCREASING THE EFFICIENCY OF THE SOFTWARE RCHITECTURE RECOVERY THROUGH SPANNING TREE BASED MAXIMAL GRAPH MINING TECHNIQUE
This paper represents a technique for recovering the Software Architecture based on Graph Pattern Matching by the help of mining techniques. enerally Software Architecture is represented in terms of graphs with set of...
A Relative Study on Retinal Vessel Segmentation
Retinal image processing is a standard medical repetition and offers number of profitable products for physicians. In the field of retinal image processing retinal vessel segmentation is the crucial task for detection of...
Review on Recent Image Segmentation Techniques
Image Segmentation refers to the process of partitioning an image into non-overlapping different regions with similar attributes, for gray level images, the most basic attribute used is the luminance amplitude, and for c...