Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Artificial intelligence and security in computing systems
Soldek J. (ed), Drobiazgiewicz L. (ed) Kluwer Academic Publishers, Norwell, MA,2003.Type:Divisible Book
Date Reviewed: Jul 1 2004

This is a collection of 27 papers, selected from 85 papers presented at the 2002 Conference on Advanced Computer Systems. The first chapter of the book, “Artificial Intelligence Methods and Intelligent Agents,” consists of 17 papers. The second chapter, “Computer Security and Safety,” contains ten papers. The editors of this book provide their summary in the preface; this makes it easy for readers to select papers that match their interests.

In chapter 1, most of the papers report on different applications of various artificial intelligence methods and intelligent agents. The application areas range from transportation systems and economics to the medical, political, and social sciences. The methods discussed in this chapter include rough sets, fuzzy expert systems, neural networks, multi-agents, and evolutionary algorithms. Uchacz et al. used fuzzy linear programming to optimize vessel traffic, while Smierzchalski applied evolutionary algorithms to avoid collisions at sea. Fuzzy expert systems were applied by Forte for auction reserve prices, by Gisella et al. for a description of the instability in the Middle East, and by Czerniak et al. for presumptive diagnosis of urinary system diseases. These are good examples of applications of different artificial intelligence methods.

In addition to the above applications, several papers also propose some general approaches in modeling and classification, with application examples. Rajer et al. propose a method to investigate variable significance in multi-dimension nonlinear systems with linear localization, and applied the method to analyze 19 factors affecting the unemployment rate in Poland from 1992 through 1999. Nawarecki et al. propose agent-based simulation in the distribution of resources with incomplete information. Smialkowska proposes models of integration in decision support systems. Pechmann et al. present a natural language communication model in a human-computer dialogue.

Chapter 2 consists of ten papers related to computer security and safety. To address user authentication on distributed systems, Kurkowski et al. propose a logical language for the specification of authentication policies, and Pejas reports applying the Ponder language for policy specification and certificate-based access control. In the area of encryption, Srebrny et al. propose a symmetric scheme based on two-dimensional cellular automata, Gajewski presents a family of cryptographic hash functions (the FSR-255), and Kurkowski et al. propose a verification method for cryptographic authentication protocols.

By applying only standard encryption schemes, Gogolewski et al. designed a simple and elegant protocol for storing data securely in a pool of servers. The term “secure” means that the user alone chooses where to store the data, and the number of copies can be determined immediately before storing the data; the server storing the data has no knowledge about other servers storing the same data; and, with high probability, the system is immune from adversaries that may gain control over a limited number of servers.

Risk analysis and management play very important roles in computer security. Cichocki et al. extend failure modes and effects analysis (FMEA) into intensive object-oriented software systems. Gorski et al. present a concept of continuous risk management in distributed software development. Fray focuses his paper on risk analysis and evaluation of e-business systems.

I found this to be a very interesting book, containing both broad applications, and fundamental theories in artificial intelligence and computing security systems. Most of the authors in this book are from Poland; it provides readers with a good overview of recent work done in these fields by our Polish colleagues.

Reviewer:  Chenyi Hu Review #: CR129837 (0501-0017)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
General (I.2.0 )
 
 
Decision Support (H.4.2 ... )
 
 
General (G.1.0 )
 
 
General (I.5.0 )
 
 
General (I.6.0 )
 
 
Types Of Systems (H.4.2 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "General": Date
Artificial experts: social knowledge and intelligent machines
Collins H., MIT Press, Cambridge, MA, 1990. Type: Book (9780262031684)
Apr 1 1991
Catalogue of artificial intelligence techniques
Bundy A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9780387529592)
Aug 1 1991
Knowledge and inference
Nagao M., Academic Press Prof., Inc., San Diego, CA, 1990. Type: Book (9780125136624)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy