語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Policy-based autonomic data governance
~
Calo, Seraphin.
FindBook
Google Book
Amazon
博客來
Policy-based autonomic data governance
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Policy-based autonomic data governance/ edited by Seraphin Calo, Elisa Bertino, Dinesh Verma.
其他作者:
Calo, Seraphin.
出版者:
Cham :Springer International Publishing : : 2019.,
面頁冊數:
xiv, 227 p. :ill., digital ;24 cm.
內容註:
Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-17277-0
ISBN:
9783030172770
Policy-based autonomic data governance
Policy-based autonomic data governance
[electronic resource] /edited by Seraphin Calo, Elisa Bertino, Dinesh Verma. - Cham :Springer International Publishing :2019. - xiv, 227 p. :ill., digital ;24 cm. - Lecture notes in computer science,115500302-9743 ;. - Lecture notes in computer science ;11550..
Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.
Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.
ISBN: 9783030172770
Standard No.: 10.1007/978-3-030-17277-0doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / P65 2019
Dewey Class. No.: 005.8
Policy-based autonomic data governance
LDR
:03964nmm a2200349 a 4500
001
2190437
003
DE-He213
005
20190424143430.0
006
m d
007
cr nn 008maaau
008
200501s2019 gw s 0 eng d
020
$a
9783030172770
$q
(electronic bk.)
020
$a
9783030172763
$q
(paper)
024
7
$a
10.1007/978-3-030-17277-0
$2
doi
035
$a
978-3-030-17277-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
P65 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P766 2019
245
0 0
$a
Policy-based autonomic data governance
$h
[electronic resource] /
$c
edited by Seraphin Calo, Elisa Bertino, Dinesh Verma.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xiv, 227 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11550
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.
520
$a
Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.
650
0
$a
Computer security.
$3
540555
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Autonomic computing.
$3
628884
650
1 4
$a
Principles and Models of Security.
$3
3382356
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Computer Hardware.
$3
892776
650
2 4
$a
Information Systems and Communication Service.
$3
891044
700
1
$a
Calo, Seraphin.
$3
3408910
700
1
$a
Bertino, Elisa.
$3
844538
700
1
$a
Verma, Dinesh.
$3
663299
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
11550.
$3
3408911
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
3382505
856
4 0
$u
https://doi.org/10.1007/978-3-030-17277-0
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9373204
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 P65 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入