EconPapers    
Economics at your fingertips  
 

Proposed Anti-Symmetric Preventive Control Optimizing the Risk on RTOS

Padma Lochan Pradhan
Additional contact information
Padma Lochan Pradhan: Department of Computer Science and Engineering, Central Institute of Technology, Naya Raipur, India

International Journal of Strategic Information Technology and Applications (IJSITA), 2016, vol. 7, issue 1, 16-31

Abstract: Now a day increasing the clients, business and computer & communications by complex IT infrastructure has growing the risk to proprietary information is a common in around the globe and as well as cloud. The operating system risk assessment, control and audit is a primary method of protecting system resources (Processor, Memory, UFS & Encryption Key) from the uncertainty. The system risk optimization is probably the most important aspect of communications security for preventive control. The cryptographic control (Encryption key) is a primary method of protecting system resources. The control is directly proportional to mitigation & mitigation is directly proportional to standard. Furthermore, the model & mechanism optimize the cost, time & resources is supposed to reduce the system risks. In this paper, the author is focusing only real time operating system level. We have to optimize the technology, resource cost and maximize the performance & throughput factor of technology (RTOS) and business.

Date: 2016
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 18/IJSITA.2016010102 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jsita0:v:7:y:2016:i:1:p:16-31

Access Statistics for this article

International Journal of Strategic Information Technology and Applications (IJSITA) is currently edited by Mehdi Khosrow-Pour

More articles in International Journal of Strategic Information Technology and Applications (IJSITA) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jsita0:v:7:y:2016:i:1:p:16-31