Security and Policy Driven Computing

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
ISBN 9781439825792
Cat# K11236

$91.95

$73.56

SAVE 20%


eBook (VitalSource)
ISBN 9781439825808
Cat# KE11147

$91.95

$64.37

SAVE 30%


eBook Rentals

Other eBook Options:
 

Features

  • Provides usable code and artifacts for security and policy driven self-managed systems
  • Identifies potential research directions and technologies that will drive innovation
  • Offers an overall assessment of self-managed systems
  • Describes research topics, gaps, and challenges of next-generation systems as well as possible solutions
  • Highlights industrial best practices with real-world examples

Summary

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.

The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention.

An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Table of Contents

A Parallel Search Optimization Using an Adaptive State-Action Index Structure
Introduction
Significance of Research
Problem Formulation
Review of Literature
Contribution
Methodology
Evaluation
Experimental Study
Discussion

A Method of Policy Discovery for Storage and Data Management
Introduction
Problem Analysis
Method of Policy Discovery
Performance Evaluation
Conclusions

Knowledge-Based Policy Discovery for Storage and Data Management
Introduction
Problem Analysis
Method of Discovery
Performance Evaluation
Conclusions
Closure

Stabilizing Read-Write Throughput of Transactional Memory for Contention Management
Introduction
Problem Statement and Goal
Brief Review of the Literature
Approach
Barriers and Issues

Parallel Search Optimization for Storage Virtualization
Introduction
Significance of Research
Problem Formulation
Review of Literature
Methodology
Evaluation
Experimental Study
Discussion

Finite Automata for Evaluating Testbed Resource Contention
Introduction
Problem Analysis
Review of Literature
Methodology
Performance Evaluation
Implementation
Conclusion

Adaptive Buffer Tuning for Data Intensive Algebraic Operations
Introduction
Significance of Work
Problem Analysis
Contribution
Methodology
Conclusion

A Quantum Method of Representing Recurring Data Deduplication Policy States
Introduction
Problem Formulation
Review of Literature
Methodology
Implementation
Conclusion

QAM—Quantum Availability Mechanics without Recovery for Storage and Data Management
Introduction
Problem Formulation
Review of Possible Solutions
Methodology

A Quantum Method with Unknown Future Tasks to Resolve Storage Message Conflicts
Introduction
Problem Formulation
Review of Possible Solutions
Methodology
Conclusion

A Quantum Automatic Controlled Method for Storage Test Coverage
Problem Statement
Wave of Programs
Methodology

Protection Mechanics with a Quantum Operator for Anomaly Attacks
Introduction
Problem Statement and Objectives
State-of-the-Art and Existing Methodologies
Barriers, Issues, and Open Problems
Methodology
Examples in Details
Experimental Results
Comparison of Detection Methods, Algorithms, and Results
Conclusions and Future Work

Index

References appear at the end of each chapter.

Author Bio(s)

Lei has hands-on experience with analysis and problem proofs. He has four patents granted and two patents filed in the U.S. patent office. Lei has been writing a book on Next Generation Enterprise System.