The automated access control mechanism afforded to an automated system control in order to attain the maximum objectives of preserving the confidentiality, integrity, authentication & high availability of information system resources. The risk optimization is the process of identifying vulnerabilities, risk, uncertainties and threats to operating system resources to achieving the maximum business objectives and deciding the maximum counter measures in to optimizing the lowest level of risk. This proposed three dimensional hypercube security models and mechanism is going to be providing high level accountability for individuals who are accessing sensitive information on multiple relation functions, operation and services RFOS on multiple application, system software, server and network. This accountability is accomplished through access control mechanisms & services that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability & Privacy through operating system control and audit function. One has to develop the computer algebraic system over a relation, function, operation & services for multiple business, resources and location for risk optimization on complex real time large scale operating system. This paper contributes to the development of an optimization mechanism that objective to determine the optimal cost to be invested into security mechanisms on the measure component of the system security. Furthermore, the model optimize the cost, time & resources is supposed to optimize the system risks and maximize the business throughput and high security system. One has to develop one solution ACM for multiple issue which is satisfying to the pervasive and ubiquitous computing based on distributed object oriented system.
[1]
Robert D. Tennyson,et al.
Best Practices and New Perspectives in Service Science and Management
,
2013
.
[2]
Jan Muntermann,et al.
Mobile Emergency Management Services Targeting Large Public Events
,
2011,
Int. J. Serv. Sci. Manag. Eng. Technol..
[3]
William Stallings,et al.
Cryptography and network security
,
1998
.
[4]
Ahad Zare Ravasan,et al.
A Framework for Assessing Governmental Websites Quality: The Case of Iranian Free Economic Zones Websites
,
2014,
Int. J. E Serv. Mob. Appl..
[5]
Edgar G. Goodaire,et al.
Discrete Mathematics With Graph Theory
,
1997
.
[6]
Roger S. Pressman,et al.
Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science)
,
2004
.
[7]
N. M. Sheikh.
Advance Computer Architecture
,
2014
.
[8]
Joseph Budu,et al.
International Journal of E-Services and Mobile Applications
,
2015
.