An Integrated Dynamic Model Optimizing the Risk on Real Time Operating System

2014 ◽  
Vol 8 (1) ◽  
pp. 38-61
Author(s):  
Prashanta Kumar Patra ◽  
Padma Lochan Pradhan

This article provide maximum preventive control, high performance and fault tolerance at an optimal resources, cost, time with high availability and quality of services to be invested into dynamic security mechanisms deciding on the measure component of real time operating system resources (Shell, File, Memory, Processor, Kernel, Encryption key, I/O devices). The authors have to define, design, develop and deploy our valuable idea to be optimizing the technology, resource, cost and maximize the throughput, productivity of business all together at anytime and anywhere in around the globe by applying this integrated dynamic model. This dynamic model interfacing, integrating, communicating, synchroning, preventing and optimize step by step through real time algebraic method over a RTOS on distributed super scalar environment (MIMD). This proposed dynamic algebraic model would be preventing the data and services on RTOS from uncertainty, unorder, unsetup, unsafe and external hackers. Mean while this model would be identifying vulnerabilities and threats on operating system resources to achieving the highest business objectives by utilizing the efficient and reliable resources management. The authors have to optimized the system attacks and down time by verification and validation of this method on complex heterogonous infrastructure.

Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

The preventive control is the one of the best and well advanced control in all aspects of day to day life. The prevention afforded to an automated system control system in order to attain the highest applicable objectives of preserving the confidentiality, integrity and high availability of information system resources (including hardware, system software, firmware, processor, memory and data).The risk assessment is the process of identifying vulnerabilities and threats to operating system resources to achieving highest business objectives and deciding what counter measures to take in reducing the lowest level of risk. The proposed RFOS model and mechanism provides accountability for individuals who are accessing sensitive information on application, system software, server and network. This accountability is accomplished through access control mechanisms that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability and Privacy through operating system audit function. We have to develop the dynamic RFOS model for risk optimization process on operating system. This paper contributes to the development of an optimization mechanism that aims to determine the optimal cost to be invested into security model and mechanisms deciding on the measure component of operating system resources (i.e. Processor, Memory, File System, Kernel). Furthermore, this algebraic model and mechanism optimize the cost, time and resources is supposed to optimize the system risks. The control is inversely proportional to the risk and control is directly proportional to the standard. In this research paper, we are proposing integrated, hierarchical and dynamic way of Relation, Function, Operation and Services Model for optimizing the risk on the real time operating system. Preventive Control is inversely proportional to the Risk and directly proportional to the Quality.


Author(s):  
Padma Lochan Pradhan

Now a day increasing the clients, business and computer & communications by complex IT infrastructure has growing the risk to proprietary information is a common in around the globe and as well as cloud. The operating system risk assessment, control and audit is a primary method of protecting system resources (Processor, Memory, UFS & Encryption Key) from the uncertainty. The system risk optimization is probably the most important aspect of communications security for preventive control. The cryptographic control (Encryption key) is a primary method of protecting system resources. The control is directly proportional to mitigation & mitigation is directly proportional to standard. Furthermore, the model & mechanism optimize the cost, time & resources is supposed to reduce the system risks. In this paper, the author is focusing only real time operating system level. We have to optimize the technology, resource cost and maximize the performance & throughput factor of technology (RTOS) and business.


Author(s):  
Frederick M. Proctor ◽  
Justin R. Hibbits

General-purpose computers are increasingly being used for serious control applications, due to their prevalence, low cost and high performance. Real-time operating systems are available for PCs that overcome the nondeterminism inherent in desktop operating systems. Depending on the timing requirements, however, many users can get by with a non-real-time operating system. This paper discusses timing techniques applicable to non-real-time operating systems, using Linux as an example, and compares them with the performance that can be obtained with true real-time OSes.


1991 ◽  
Vol 24 (2) ◽  
pp. 25-26
Author(s):  
C.D. Locke ◽  
R.P. Cook ◽  
K.D. Gordon ◽  
H. Tokuda

Author(s):  
Zeeshan Murtaza ◽  
Shoab Khan ◽  
Abid Rafique ◽  
Khalid Bajwa ◽  
Umer Zaman

1999 ◽  
Author(s):  
Khawar M. Zuberi ◽  
Padmanabhan Pillai ◽  
Kang G. Shin ◽  
Takaaki Imai ◽  
Wataru Nagaura ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document