Citation
Ismail Ahmad, and Ewe, Hong Tat (2005) A model for secure knowledge sharing. In: Third International Conference on Information Technology and Applications, 2005. ICITA 2005. IEEE Xplore, pp. 421-425. ISBN 0-7695-2316-1
Text
A model for secure knowledge sharing.pdf Restricted to Repository staff only Download (193kB) |
Abstract
Improvements made in digital data processing resulted in the ability to store knowledge objects in sharing systems in the form of documents, images, audio and even video streams. However, with the increasing reliance on online knowledge sharing technologies, there is also an increasing danger that knowledge objects stored in digital forms are subjected to concerted malicious and possible criminal attacks. Digital knowledge objects can become easy prey to tampering and modifications which may defeat the original intent for knowledge sharing as well as causing loss of confidence among users. The preservation of the integrity of digital knowledge objects becomes increasingly important now than ever and the need has come for technologies to safeguard the authenticity and integrity of such objects. This paper proposes a model to incorporate automated detection and recovery mechanisms for tampered knowledge objects to make sure that knowledge-processing resources continue to perform correct processing operations at all times.
Item Type: | Book Section |
---|---|
Subjects: | Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science |
Depositing User: | Ms Rosnani Abd Wahab |
Date Deposited: | 22 Aug 2011 03:12 |
Last Modified: | 02 Dec 2013 03:42 |
URII: | http://shdl.mmu.edu.my/id/eprint/2390 |
Downloads
Downloads per month over past year
Edit (login required) |