000 | 05135nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-030-17277-0 | ||
003 | DE-He213 | ||
005 | 20240730171005.0 | ||
007 | cr nn 008mamaa | ||
008 | 190424s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030172770 _9978-3-030-17277-0 |
||
024 | 7 |
_a10.1007/978-3-030-17277-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aPolicy-Based Autonomic Data Governance _h[electronic resource] / _cedited by Seraphin Calo, Elisa Bertino, Dinesh Verma. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXIV, 227 p. 126 illus., 36 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11550 |
|
505 | 0 | _aSystems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things. | |
520 | _aAdvances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments. | ||
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aPrinciples and Models of Security. _978911 |
650 | 2 | 4 |
_aComputer Communication Networks. _996639 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aComputer Hardware. _933420 |
700 | 1 |
_aCalo, Seraphin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996641 |
|
700 | 1 |
_aBertino, Elisa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996642 |
|
700 | 1 |
_aVerma, Dinesh. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996644 |
|
710 | 2 |
_aSpringerLink (Online service) _996647 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030172763 |
776 | 0 | 8 |
_iPrinted edition: _z9783030172787 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11550 _996649 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-17277-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87340 _d87340 |