Which operating system access control technique will provide the greatest overall benefit to users?

Author(s):  
Stephen Smalley
2003 ◽  
Vol 18 (3) ◽  
pp. 291-306 ◽  
Author(s):  
Cheryl L. Dunn ◽  
Gregory J. Gerard ◽  
James L. Worrell

Systems and financial statement auditors are often responsible for evaluating compliance with system security controls as part of their annual audit procedures. This assignment provides a practical learning experience that relates your course material to actual tasks practitioners perform. You are provided with simulated data from a realistic company example and are asked practitioner-relevant questions covering a variety of issues related to network operating system access. Monitoring and limiting network operating system access and mitigating the related risk is crucial since any application (including accounting applications) can be accessed, and potentially compromised, through the network operating system.


2015 ◽  
Vol 5 (2) ◽  
pp. 62-79
Author(s):  
Prashant Kumar Patra ◽  
Padma Lochan Pradhan

The automated access control mechanism afforded to an automated system control in order to attain the maximum objectives of preserving the confidentiality, integrity, authentication & high availability of information system resources. The risk optimization is the process of identifying vulnerabilities, risk, uncertainties and threats to operating system resources to achieving the maximum business objectives and deciding the maximum counter measures in to optimizing the lowest level of risk. This proposed three dimensional hypercube security models and mechanism is going to be providing high level accountability for individuals who are accessing sensitive information on multiple relation functions, operation and services (RFOS) on multiple application, system software, server and network. This accountability is accomplished through access control mechanisms & services that require Confidentiality, Integrity, Authentication, Access control, Non repudiation, Availability & Privacy through operating system control and audit function. One has to develop the computer algebraic system over a relation, function, operation & services for multiple business, resources and location for risk optimization on complex real time large scale operating system. This paper contributes to the development of an optimization mechanism that objective to determine the optimal cost to be invested into security mechanisms on the measure component of the system security. Furthermore, the model optimize the cost, time & resources is supposed to optimize the system risks and maximize the business throughput and high security system. One has to develop one solution (ACM) for multiple issue which is satisfying to the pervasive and ubiquitous computing based on distributed object oriented system.


Author(s):  
Shoko Miyagawa ◽  
Shigeichiro Yamasaki ◽  
Eiko Uchiyama ◽  
Donald L. Amoroso

In this paper, the authors present a framework for information sharing with privacy and priority control in long-term care designed to promote appropriate information sharing among the people who are involved in long-term care for provision of better care service. The authors' framework includes four agents (user agent, local information system access agent, authentication/access control agent and priority control agent) and two databases (user database and care record index database). The LIS (local information system) access agent creates and updates the care record index database, which act as an index when user agents try to access to care recipient's record, based on the Open Authentication protocol. It also acts as a query interface from each user agent. The authentication/access control agent allows sensitive information to be shared in accordance with the policy defined by care recipient. The priority control agent judges the urgency of the information for either periodic or immediate notification. The authors also propose an implementation of this framework using the Resource Description Framework Site Summary, and demonstrate how our framework works with the scenario of care recipient's unexpected injury. In summary, this framework is designed to help people who require long-term care and provides an effective system for each staff that is in charge of administering long-term care services. The authors' information sharing system incorporates a multi-agent architecture to facilitate information sharing and privacy/priority control. The authors believe that this research provides an important first step for researchers who intend to build a prototype to automate the processes of information sharing for long-term health care.


Sign in / Sign up

Export Citation Format

Share Document