Three Dimensional Hypercube Model and Mechanism: Optimizing the Risk on Real Time Operating System

Three Dimensional Hypercube Model and Mechanism: Optimizing the Risk on Real Time Operating System

Prashant Kumar Patra, Padma Lochan Pradhan
Copyright: © 2015 |Pages: 18
DOI: 10.4018/IJCAC.2015040105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The automated access control mechanism afforded to an automated system control in order to attain the maximum objectives of preserving the confidentiality, integrity, authentication & high availability of information system resources. The risk optimization is the process of identifying vulnerabilities, risk, uncertainties and threats to operating system resources to achieving the maximum business objectives and deciding the maximum counter measures in to optimizing the lowest level of risk. This proposed three dimensional hypercube security models and mechanism is going to be providing high level accountability for individuals who are accessing sensitive information on multiple relation functions, operation and services (RFOS) on multiple application, system software, server and network. This accountability is accomplished through access control mechanisms & services that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability & Privacy through operating system control and audit function. One has to develop the computer algebraic system over a relation, function, operation & services for multiple business, resources and location for risk optimization on complex real time large scale operating system. This paper contributes to the development of an optimization mechanism that objective to determine the optimal cost to be invested into security mechanisms on the measure component of the system security. Furthermore, the model optimize the cost, time & resources is supposed to optimize the system risks and maximize the business throughput and high security system. One has to develop one solution (ACM) for multiple issue which is satisfying to the pervasive and ubiquitous computing based on distributed object oriented system.
Article Preview
Top

1. Introduction

Now increasing the complex business, applications, clients, users, resources over a multiple business domain of the multiple locations of business, computer & communications system by IT industries has increased the uncertainty, un-order and th risk of theft to proprietary information. The real time operating system control & audit is a primary method of protecting system resources (Processor, Memory & Encryption Key, File & Shell). The preventive system control is probably the most important aspect of communications network security and becoming increasingly important as basic building block for information system security. The control is inversely proportional to the risk & mean while control is directly proportional to the quality of standard. The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the algebraic system model for risk mitigation on large scale unix operating system (MIMD) (Kai, 2008) based on available technology, business & resources. We have to prevent our data and service from business, technology & resources over a complex operating system (Stalling, 2006; Shon 2002).

The real time operating system (central server) is a large scale has even greater processing, responsibilities and high powers for the multiple business and multiple products & clients like web based and mobile computing. It is just like a traffic management system, it makes sure that different tools, application, programs and software packages, the users and clients running at the same time do not interfere with each other (see Figure 1) (Kai, 2008; Tanenbaum, 2010).

Figure 1.

Business, resource and technology preventing data and info

IJCAC.2015040105.f01

The multi programming, time shearing, parallel programming is solving our objective in right time and right way over a multiple Relation, Function, Operation & Services on heterogeneous complex infrastructure. The complex operating system is also responsible for risk and security ensuring that unauthorized users do not access the system. The all major computer platforms (hardware and software) require and sometimes include an operating system. HP_UX, Sun solaria, AIX, LINUX, WINDOW, NT, WIN2000, VME, OS/400, Z/OS all examples of large scale (MIMD) operating systems (Kai. 2008).

The Internal Structure of the Operating system can be seen in Figure 2 (O’ Reilly, 1995; Sumitabh 2009; Sun Microsystems 2002).

Figure 2.

Internal architecture of RTOS preventing data

IJCAC.2015040105.f02

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing