{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:48:40Z","timestamp":1726040920164},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030290283"},{"type":"electronic","value":"9783030290290"}],"license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29029-0_13","type":"book-chapter","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T08:04:51Z","timestamp":1565769891000},"page":"137-141","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["User Oriented Protocols for Data Sharing and Services Management"],"prefix":"10.1007","author":[{"given":"Lidia","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]},{"given":"Urszula","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"13_CR1","volume-title":"Security Practitioner and Cryptography Handbook and Study Guide Set","author":"M Gregg","year":"2014","unstructured":"Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)"},{"key":"13_CR2","volume-title":"Management Information Systems \u2013 Managing the Digital Firm","author":"KC Laudon","year":"2002","unstructured":"Laudon, K.C., Laudon, J.P.: Management Information Systems \u2013 Managing the Digital Firm, 7th edn. Prentice-Hall International Inc., Cliffs (2002)","edition":"7"},{"key":"13_CR3","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"2001","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)"},{"issue":"2","key":"13_CR4","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijinfomgt.2014.11.006","volume":"35","author":"L Ogiela","year":"2015","unstructured":"Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manage. 35(2), 154\u2013159 (2015)","journal-title":"Int. J. Inf. Manage."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.pmcj.2015.05.007","volume":"29","author":"L Ogiela","year":"2016","unstructured":"Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130\u2013141 (2016)","journal-title":"Pervasive Mob. Comput."},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/JSYST.2015.2409213","volume":"11","author":"L Ogiela","year":"2017","unstructured":"Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11(2), 405\u2013414 (2017)","journal-title":"IEEE Syst. J."},{"key":"13_CR7","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-03958-4_28","volume-title":"New Challenges in Computational Collective Intelligence","author":"MR Ogiela","year":"2009","unstructured":"Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol. 244, pp. 327\u2013336. Springer, Heidelberg (2009)"},{"key":"13_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-24267-0_5","volume-title":"Advanced Computer Science and Information Technology","author":"MR Ogiela","year":"2011","unstructured":"Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31\u201335. Springer, Heidelberg (2011)"},{"key":"13_CR9","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-69811-3_28","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017","author":"U Ogiela","year":"2018","unstructured":"Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309\u2013313. Springer, Heidelberg (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-69811-3_28"},{"key":"13_CR10","volume-title":"Computational Number Theory and Modern Cryptography","author":"SY Yan","year":"2013","unstructured":"Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, New York (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Networked-based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29029-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T08:14:14Z","timestamp":1565770454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29029-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"ISBN":["9783030290283","9783030290290"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29029-0_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NBiS - 2019","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network-Based Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oita","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nbis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/nbis\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}