Normal view MARC view ISBD view

Policy-Based Autonomic Data Governance [electronic resource] / edited by Seraphin Calo, Elisa Bertino, Dinesh Verma.

Contributor(s): Calo, Seraphin [editor.] | Bertino, Elisa [editor.] | Verma, Dinesh [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Information Systems and Applications, incl. Internet/Web, and HCI: 11550Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XIV, 227 p. 126 illus., 36 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030172770.Subject(s): Computer security | Computer networks  | Artificial intelligence | Computers | Principles and Models of Security | Computer Communication Networks | Artificial Intelligence | Computer HardwareAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.
In: Springer Nature eBookSummary: Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.
    average rating: 0.0 (0 votes)
No physical items for this record

Systems, use-cases and foundational principles underlying generative policies -- AGENP: An ASGrammar-based GENerative Policy Framework -- Value of Information: Quantification and Application to Coalition Machine Learning -- Self-Generating Policies for Machine Learning in Coalition Environments -- Approaches and techniques for safe autonomy -- Can N-version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation -- Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection -- FADa-CPS - Faults and Attacks Discrimination in Cyber Physical Systems -- Techniques and Systems for Anomaly Detection in Database Systems -- Policies and autonomy in federated and distributed environments -- Towards Enabling trusted Artificial Intelligence via Blockchain -- Secure Model Fusion for Distributed Learning using Partial Homomorphic Encryption -- Policy based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis -- Redundancy for the Autonomic Management of Fault-tolerance in the Internet of Things.

Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.

There are no comments for this item.

Log in to your account to post a comment.