Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization

Full Text (PDF, 591KB), PP.52-58

Views: 0 Downloads: 0

Author(s)

Padma Lochan Pradhan 1,*

1. Dept. of CSE, Central Institute of Technology, CSVTU, Naya Raipur, CG, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.06.06

Received: 22 Jul. 2015 / Revised: 16 Nov. 2015 / Accepted: 1 Feb. 2016 / Published: 8 Jun. 2016

Index Terms

Access Control Mechanism, Unix File System, Real Time Operating System, Prevent, detect & correct(PDC), Risk Assessment

Abstract

At this fastest growing of information age, there is a rapid change of business, resources and technology, mean while increasing the requirement of electronic commerce for the sophisticated societies in around the globe. During this process increasing the uncertainty, un order, un safe and un setup due to un authorize users, hackers is a great issue for down time of communication system. Our objective to determine and resolve these uncertainty problems to develop this proposed combinatory ACM to optimize the accessibilities of resources and maximize quality of services for all the time and every time to co-op with pervasive, ubiquitous & autonomy system. The relation, function, operation, maintaince and services are the vital role for all aspect of multiples societies, business and technologies in around the cloud. Meanwhile, it will be more accountable for performance, fault tolerance, throughput, benchmarking on any computational services for all the time. We have to make more simplification, unification and step by step normalization by applying permutation & combinations on UFS ACM mechanism on distributed object oriented system on multi-dimensional work culture. This access control mechanism is preventing, detecting, correcting, verification and validation of the UFS ACM in background process of RTOS.

Cite This Paper

Padma Lochan Pradhan, "Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.6, pp.52-58, 2016. DOI:10.5815/ijcnis.2016.06.06

Reference

[1]A.K. Gupta, Management Information System. New Delhi, India: S Chand Publishing, 2012.
[2]Adrian Waller, “Editorial: Special issue on Identity Protection and Management,” Journal of information security and application, 19, 2014.
[3]Bernard Kolman, Discrete Mathematical Structures. New Delhi: Person Education India, 2007.
[4]Brendan Jennings and Rolf Stadler, “Resource Management in Clouds: Survey and Research Challenges, “Journal of Network System Management, Springer, Springer Science+Business Media, New York, February 2014.
[5]Diogo A. B. Fernandes, “Security issues in cloud environments: a survey, Intl. Journal of Info. Security, Springer. 13:113–170, 2014.
[6]Danny Bradbury, “Can Security and Privacy Co-exist?,” Danny Bradbury Infosecurity. Volume 8, Issue 6, Pages 33–35, November–December 2011.
[7]Das Sumitabh, UNIX System V UNIX Concept & Application. Delhi, India: Tata McGraw Hill, 2009.
[8]Dario Forte, “Security audits in mixed environments,” Network Security, Vol.3, No. 3, pp. 17-19, March 2009.
[9]Hwang Kai, Advance Computer Architecture. New Delhi, India: Tata McGraw Hill, 2008.
[10]John R Vacca, Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann, 2009.
[11]Joe. L Matt, Discrete Mathematics for Scientist and Mathematician. New Delhi: Person Education India, 2008.
[12]John B. Kramer, The CISA Prep Guide. New Delhi, India: Wiley Publishing Inc, 2003.
[13]Mathew Nicho Shafaq, “Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective, “International Journal of Information Security and Privacy, 8(1), 1-18, January-March 2014.
[14]Nasir Abbas, Memory-Type Control Charts for Monitoring the Process Dispersion, Quality and Reliability Engineering International. Wiley, 30, 623–632, 2014.
[15]O’ Reilly, Essential of System Administration. O’ Reilly Media: USA, 1995.
[16]Shon Harrish, CISSP Exam Study Guide. New Delhi, India: Dreamtech, 2002.
[17]Shon Harrish, Security Management Practices. New Delhi, India: Wiley Publishing Inc, 2002.
[18]Sun-Microsystems, UNIX Sun Solaris System Administration. USA.
[19]Tong xin and Ban Xiaofang, “A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain,” Intl. Jour. of Info & Network Security, 3, 3, 2014.
[20]Tanenbaum, Computer Network. New Delhi: Person Education India, 2009.
[21]Tim Thomas, “A Mandatory Access Control Mechanism for the Unix file system,” Motorola Inc., Microcomputer Division, IEEE, 1988.
[22]Tanenbaum, Operating System Design and Implementation. New Delhi: Person Education India, 2010.
[23]William Stalling, Cryptography and Network Security. New Delhi: Person India, 2006.
[24]William Stalling, Operating System Internals & Design Principle. New Delhi, India: Person India, 2009.
[25]Weber Ron, Information System Control & Audit. New Delhi: Person Education India, 2002.