Dynamic Butterfly ACM for Risk Optimization on the Real-Time Unix Operating System

Dynamic Butterfly ACM for Risk Optimization on the Real-Time Unix Operating System

Abhishek Asthana, Padma Lochan Pradhan
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJSI.297505
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The system access control mechanism is the process of communicating, mediating and transforming each and every request to system resources, application and data maintained by the real time operating system and determining whether the request should be approve, created, granted, valid or denied as per system security policy. The access control mechanism, assessment and decision is enforced by implementing regulations established by a security policy. The different access control policies can be applied, corresponding to different level (development, deployment & production) of criteria for defining what should, and what, when and how should be or not be allowed, and, in some sense, to different definitions of what ensuring security means. We have to investigate the basic concepts behind access control design and enforcement, and point out different security requirements that may need to be taken into consideration.We have to apply the attributes of UFS (Read, Write & Execute) to integrate, communicate, synchronizing on real time operating system for all the time and every time.
Article Preview
Top

1. Introduction

The technical security controls for risk assessment can be configured to protect against given types of threats, unauthorized user & uncertainty to source and object. These controls may range from simple to complex measures and usually involve system architectures; engineering design and security packages with a mix of hardware, software, and firmware. All of these measures should work together to secure critical and sensitive data, information, and IT system functions. Technical controls can be grouped into the following: critical, major, minor (H, M, L) categories, according to primary purpose the organization (Thomas, 2000; Tanenbaum, 2010; Weber, 2002).

Now a day, increasing the multiple business, applications, client, users, resources over a complex business domain of the multiple location of WAN, LAN, IT Infrastructure, computer & communications system by complex web application ( B2B, B2C, P2P, G2G) has increased the risk of theft of proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory& Encryption Key). The preventive system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for information system security. The control is inversely proportional to the risk &mean while control is directly proportional to the quality of standard( S ). The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the three dimensional hypercube model for risk mitigation on large scale unix operating system based on available product, business and resources. We have to prevent our data and service from public resources and unauthorized user over a complex operating system(O’Reilly, 1995;Sumitabh, 2009;Sun-Microsystem, 2002; Thomas, 1998).

The operating system (server system) in large scale has even greater responsibilities and powers for large scale business like web based and mobile computing. It is just like a traffic management system, it makes sure that different programs and software packages the users and clients running at the same time do not interfere with each other. The operating system is also responsible for risk and security angle to ensuring that unauthorized users do not access the objects.

In the large scale operating system the multitasking, multiuser, time sharing operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn. It manages the sharing of internal memory among multiple applications with multiple function and location. It handles input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. On computers that can provide parallel processing, an operating system can manage how to divide the program (parallel program) so that it runs on more than one processor at a time(O’Reilly, 1995;Sumitabh, 2009;Sun-Microsystem, 2002; Thomas, 1998).

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing