A model for secure knowledge sharing

Citation

Ismail Ahmad, and Ewe, Hong Tat (2005) A model for secure knowledge sharing. In: Third International Conference on Information Technology and Applications, 2005. ICITA 2005. IEEE Xplore, pp. 421-425. ISBN 0-7695-2316-1

[img] Text
A model for secure knowledge sharing.pdf
Restricted to Repository staff only

Download (193kB)

Abstract

Improvements made in digital data processing resulted in the ability to store knowledge objects in sharing systems in the form of documents, images, audio and even video streams. However, with the increasing reliance on online knowledge sharing technologies, there is also an increasing danger that knowledge objects stored in digital forms are subjected to concerted malicious and possible criminal attacks. Digital knowledge objects can become easy prey to tampering and modifications which may defeat the original intent for knowledge sharing as well as causing loss of confidence among users. The preservation of the integrity of digital knowledge objects becomes increasingly important now than ever and the need has come for technologies to safeguard the authenticity and integrity of such objects. This paper proposes a model to incorporate automated detection and recovery mechanisms for tampered knowledge objects to make sure that knowledge-processing resources continue to perform correct processing operations at all times.

Item Type: Book Section
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Depositing User: Ms Rosnani Abd Wahab
Date Deposited: 22 Aug 2011 03:12
Last Modified: 02 Dec 2013 03:42
URII: http://shdl.mmu.edu.my/id/eprint/2390

Downloads

Downloads per month over past year

View ItemEdit (login required)