1st Edition

Security and Policy Driven Computing

By Lei Liu Copyright 2011
    290 Pages 85 B/W Illustrations
    by CRC Press

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.

    The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention.

    An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

    A Parallel Search Optimization Using an Adaptive State-Action Index Structure
    Introduction
    Significance of Research
    Problem Formulation
    Review of Literature
    Contribution
    Methodology
    Evaluation
    Experimental Study
    Discussion

    A Method of Policy Discovery for Storage and Data Management
    Introduction
    Problem Analysis
    Method of Policy Discovery
    Performance Evaluation
    Conclusions

    Knowledge-Based Policy Discovery for Storage and Data Management
    Introduction
    Problem Analysis
    Method of Discovery
    Performance Evaluation
    Conclusions
    Closure

    Stabilizing Read-Write Throughput of Transactional Memory for Contention Management
    Introduction
    Problem Statement and Goal
    Brief Review of the Literature
    Approach
    Barriers and Issues

    Parallel Search Optimization for Storage Virtualization
    Introduction
    Significance of Research
    Problem Formulation
    Review of Literature
    Methodology
    Evaluation
    Experimental Study
    Discussion

    Finite Automata for Evaluating Testbed Resource Contention
    Introduction
    Problem Analysis
    Review of Literature
    Methodology
    Performance Evaluation
    Implementation
    Conclusion

    Adaptive Buffer Tuning for Data Intensive Algebraic Operations
    Introduction
    Significance of Work
    Problem Analysis
    Contribution
    Methodology
    Conclusion

    A Quantum Method of Representing Recurring Data Deduplication Policy States
    Introduction
    Problem Formulation
    Review of Literature
    Methodology
    Implementation
    Conclusion

    QAM—Quantum Availability Mechanics without Recovery for Storage and Data Management
    Introduction
    Problem Formulation
    Review of Possible Solutions
    Methodology

    A Quantum Method with Unknown Future Tasks to Resolve Storage Message Conflicts
    Introduction
    Problem Formulation
    Review of Possible Solutions
    Methodology
    Conclusion

    A Quantum Automatic Controlled Method for Storage Test Coverage
    Problem Statement
    Wave of Programs
    Methodology

    Protection Mechanics with a Quantum Operator for Anomaly Attacks
    Introduction
    Problem Statement and Objectives
    State-of-the-Art and Existing Methodologies
    Barriers, Issues, and Open Problems
    Methodology
    Examples in Details
    Experimental Results
    Comparison of Detection Methods, Algorithms, and Results
    Conclusions and Future Work

    Index

    References appear at the end of each chapter.

    Biography

    Lei has hands-on experience with analysis and problem proofs. He has four patents granted and two patents filed in the U.S. patent office. Lei has been writing a book on Next Generation Enterprise System.