|
|
|
|
LEADER |
05588nam a2200577 4500 |
001 |
978-3-030-17277-0 |
003 |
DE-He213 |
005 |
20191025052925.0 |
007 |
cr nn 008mamaa |
008 |
190424s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030172770
|9 978-3-030-17277-0
|
024 |
7 |
|
|a 10.1007/978-3-030-17277-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Policy-Based Autonomic Data Governance
|h [electronic resource] /
|c edited by Seraphin Calo, Elisa Bertino, Dinesh Verma.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XIV, 227 p. 126 illus., 36 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 11550
|
505 |
0 |
|
|a Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.
|
520 |
|
|
|a Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer hardware.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Principles and Models of Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28040
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Computer Hardware.
|0 http://scigraph.springernature.com/things/product-market-codes/I1200X
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
700 |
1 |
|
|a Calo, Seraphin.
|e editor.
|0 (orcid)0000-0003-4668-3989
|1 https://orcid.org/0000-0003-4668-3989
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bertino, Elisa.
|e editor.
|0 (orcid)0000-0002-4029-7051
|1 https://orcid.org/0000-0002-4029-7051
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Verma, Dinesh.
|e editor.
|0 (orcid)0000-0003-1933-7343
|1 https://orcid.org/0000-0003-1933-7343
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030172763
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030172787
|
830 |
|
0 |
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 11550
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-17277-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|