Three Dimensional Hypercube Model and Mechanism: Optimizing the Risk on Real Time Operating System
Prashant Kumar Patra and
Padma Lochan Pradhan
Additional contact information
Prashant Kumar Patra: Department of Computer Science and Engineering, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India
Padma Lochan Pradhan: Department of Computer Science and Engineering, Central Institute of Technology, Naya Raipur, India
International Journal of Cloud Applications and Computing (IJCAC), 2015, vol. 5, issue 2, 62-79
Abstract:
The automated access control mechanism afforded to an automated system control in order to attain the maximum objectives of preserving the confidentiality, integrity, authentication & high availability of information system resources. The risk optimization is the process of identifying vulnerabilities, risk, uncertainties and threats to operating system resources to achieving the maximum business objectives and deciding the maximum counter measures in to optimizing the lowest level of risk. This proposed three dimensional hypercube security models and mechanism is going to be providing high level accountability for individuals who are accessing sensitive information on multiple relation functions, operation and services (RFOS) on multiple application, system software, server and network. This accountability is accomplished through access control mechanisms & services that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability & Privacy through operating system control and audit function. One has to develop the computer algebraic system over a relation, function, operation & services for multiple business, resources and location for risk optimization on complex real time large scale operating system. This paper contributes to the development of an optimization mechanism that objective to determine the optimal cost to be invested into security mechanisms on the measure component of the system security. Furthermore, the model optimize the cost, time & resources is supposed to optimize the system risks and maximize the business throughput and high security system. One has to develop one solution (ACM) for multiple issue which is satisfying to the pervasive and ubiquitous computing based on distributed object oriented system.
Date: 2015
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCAC.2015040105 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jcac00:v:5:y:2015:i:2:p:62-79
Access Statistics for this article
International Journal of Cloud Applications and Computing (IJCAC) is currently edited by B. B. Gupta
More articles in International Journal of Cloud Applications and Computing (IJCAC) from IGI Global
Bibliographic data for series maintained by Journal Editor ().