Proposed Abelian ACM Method Optimizing: The Risk on a Real-Time Unix Operating System

Proposed Abelian ACM Method Optimizing: The Risk on a Real-Time Unix Operating System

Abhishek Asthana, Padma Lochan Pradhan
DOI: 10.4018/IJSPPC.2021100103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This proposed UFS ACM is the best preventive control around the world for heterogeneous applications on multiple hardware and software. The subject and object can be able to map, integrate, synchronize, and communicate through reading, writing, and executing over a UFS on the complex web infrastructure. We have to investigate the basic concepts behind access control design and enforcement and point out different security requirements that may need to be taken into consideration as per business, resources, and technology available to us. This paper has to formulate and implement several access control mechanisms, methods, and models on normalizing them step by step, which has been highlighted in the proposed model for present and future requirements. This research paper contributes to the development of an optimization model that aims to determine the optimal cost, time, and maximize the quality of services to be invested into security model and mechanisms deciding on the measure components of UFS.
Article Preview
Top

Introduction

The preventive control ACM provides accountability for individuals who are accessing sensitive information on the application, system software, server, and network. We have to develop the multi-dimensional Abelian’s model for risk mitigation on a large-scale UNIX operating system based on available technology, business, and resources. We have to prevent our data and service from public resources and unauthorized users over a complex real-time operating system (O’Reilly, 2005; Weber, 2002). Now a day, increasing the complex business, applications, clients, users, and resources over a heterogeneous business domain of the multiple locations of WAN, LAN, IT Infrastructure, computer & communications system by IT industries has increased the uncertainty, un order, risk of theft to proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory, Kernel & File system).

The purpose of the Abelian access control mechanism is to optimize the risk of unauthorized access to physical and logical devices of the Unix Operating System. The Read, Write and Execute (RWX) mechanism is a fundamental component of the security mechanism, audit, policy, procedure, and compliance programs that determine the security mapping, integrity, and access control policies, the procedure is implemented in the right place and the right time to protect valuable data, such as user’s access information. Many more IT organizations have complex infrastructure and policies, procedures that limit access to dynamic networks, computer systems, applications, files, and sensitive data, such as customer information and intellectual property (Sumitabh,2009) [30]. The access control mechanism is more complex and may be challenging to manage in dynamic Information Technology environments that involve on-premises systems like IoT, cloud services, and EDGE computing. During the implementation of the security model, technology vendors have shifted away from users Sign-on (SSO) devices to unified access control management, which offers access controls for on-customer premises and cloud environments (IoT) (O’Reilly. 2005; Pradhan, 2016; Sumitabh, 2009; Sun-Microsystems,2002). This access control is an attribute-based logical access control mechanism where the authorization and authentication process perform a set (RWX) of operations and service is determined by evaluating attributes associated with them (source & target) subject, object, requested operations services, and in some cases environment conditions against the policy, procedure, process, rules, functional, dependency or relationships (RWX) that describe the allowable operations and services for complex Unix Operating system(Sumitabh,2009). In this twenty-first century, information and data access control are the best ones with an Attribute-Based Access Control Mechanism. The Attribute based access control (ABAC) can apply over the users' attributes, action, reaction, attributes, context attributes (such as time, device, and location), resource attributes (such as a record’s sensitivity) (Weber,2016), and much more. The fact that a Unix Operating system can use multiple attributes (data) that described by the users, the resource, and the context makes ABAC multi-dimensional and capable of supporting logically any access control model (O’Reilly. 2005; Pradhan, 2016; Sumitabh, 2009; Sun-Microsystems,2002). Nowadays, the use of data security is in great demand in the trading, business, and communication industries. The functional dependency of ABAC in database rolling major activities for creating, generating, and collecting the exact security pattern and information (O’Reilly. 2005; Pradhan,2016; Sumitabh,2009; Sun-Microsystems,2002). The Abelian functional dependency, and multi-values dependency helping in a decision support system to assemble data and metadata to resolve the uncertainty & unordered. The large datasets can be reassembled through Java programming in a faster and quicker way. The Attributes based protection can be implemented through set theory, relational algebra, and combinometric for managing the set of risks. The large datasets, pattern data helping to the customer, manufacturer, vendor, order, and product in the right way at the right time. Therefore, the Abelian mechanism has to develop through the ACM key for stronger and faster risk analysis. The knowledge, security, risk, and decision pattern can be developed through attributes-based access control parameters management.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
View Complete Journal Contents Listing