IJCNIS Vol. 10, No. 9, 8 Sep. 2018
Cover page and Table of Contents: PDF (size: 673KB)
Full Text (PDF, 673KB), PP.47-59
Views: 0 Downloads: 0
Dynamic Scripting programming Language, Processor, Memory, Performance analysis, Access Control Mechanism (ACM), Unix File System (UFS), Procedural Programming Language (PPL), Preventive Detective Control (PDC), Read Write Execute (RWX)
This proposed dynamic scripting language is a vital role in the complex real-time operating system to review, analysis, protect, detect & correct on data, application, network, software and hardware as per the desired manner to achieve the highest performance of the RTOS. The dynamic language is a primarily responsible for analysis of the fine tuning, performance, fault-tolerance, throughput of the system components at the right time. This research work contributes to the design and development of an automated mechanism that objective to investigate the minimal resource utilization to the robust computing services. We have to define & deployment the Unix scripting codes for real time operating system to achieve the reliability, scalability of the real-time MIMD platform. We have to run this SPL on background process to integrate with real-time hardware, software, network to facilitate to other dependants components. This dynamic code is integrating, interfacing, communicating, message passing, replicating among the several subjects and objects over a real-time operating system.
Padma Lochan Pradhan, "Role of Scripting Language on Unix Operating System for Risk Assessment", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.9, pp.47-59, 2018. DOI:10.5815/ijcnis.2018.09.05
[1]A.K. Gupta, Management Information System. New Delhi, India: S Chand Publishing, 2012.
[2]Andrew and Richard, UNIX Network Programming. New Delhi: Person Education India, 2011.
[3]Andrew Tang, "A guide to system penetration Testing," System & Network Security, August, 2014.
[4]Adam Hoover (2010). System Programming with C & Unix, Delhi: Pearson India.
[5]Andrew, Bill; Richard (2011). UNIX Network Programming. New Delhi India, PHI.
[6]Adrian Waller (2014). Editorial: Special issue on Identity Protection and Management, Journal of information security and application, Vol.19.
[7]Andrew Tang (2014). A guide to penetration Testing, Network Security.
[8]Andrian Devis (2011). What Is Critical to Your Infrastructure?," Information security, Volume 8, Issue 5, Pages 18–21.
[9]Balagurusamy, E.B. (2010). Object Oriented Programming C++. New Delhi, India: Tata McGraw Hill.
[10]Balagurusamy, E.B. (2007). Programming in Java. New Delhi, India: Tata McGraw Hill.
[11]Byrons Gottfried.(2009). Programming with C. New Delhi, India: Tata McGraw Hill
[12]Colin Ritche (2006) Operating System in Unix & Window, New Delhi India, BPB Publication.
[13]Ching-Hsien Hsu (2014). Real-time embedded software for multi-core platforms, Journal of Systems Architecture, Vol. 60, 245–246.
[14]Diogo A. B. Fernandes, "Security issues in cloud environments: a survey," International Journal of Information Security, Springer. 13:113–170, 2014.
[15]Debasis, Jana (2010). C++ & Object Oriented Programming. Delhi: Pearson India.
[16]EKTA WALIA (2002) Operating Concept New Delhi India, Khanna Book Publishing
[17]Franklyn & David. (2008). Design Concept in Programming Languages. Delhi:PHI.
[18]Finne, T. (2000). Information Systems Risk Management: Key Concepts and Business Processes. Computers & Security, 19(3), 234–242. doi:10.1016/S0167-4048(00)88612-5.
[19]Forte, D. (2009). Security audits in mixed environments, Network Security, 3(3), 17-19.
[20]G. Posta and A. Kaganb, "Computer security and operating system updates,"Information and Software Technology, Vol. 45, pp. 461– 467, January 2003.
[21]Godofredo, Julio, "System performance evaluation by combining RTC and VHDL simulation: A case study on NICs," Journal of Systems Architecture, Vol. 59, 1277–1298, 2013.
[22]Herbert, Scheldt. (2010). The Complete Java Reference. New Delhi, India: Tata McGraw Hill.
[23]Hwang, Kai. (2008). Advance Computer Architecture. New Delhi, India: Tata McGraw Hill.
[24]Richard (2010) Unix Network Programming New Delhi India, PHI
[25]Jan Camenisch and Maria (2014). Concepts and languages for privacy preserving attribute-based authentication," Journal Of Information Security And Applications, 19, 25-44.
[26]Khalid, A. (2008). Programming Guide to Java. Delhi, India: Pearson India.2008.
[27]KVN Sunitha & N. Kalyani (2008). Programming in Unix & Computer Design. Hyderabad: BSP Publication.
[28]Kumar Saurabh (2008). Unix Programming New Delhi India Wiley India.
[29]Kumar N Rao Java Programming Dream Tech New Delhi 2009.
[30]Maurice J. Bach ( 2012). The Design of Unix Operating System New Delhi India.
[31]Mathew NichoShafaq (2014). Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective," International Journal of Information Security and Privacy,8(1), 1-18.
[32]Martin Johns, "Script-templates for the Content Security Policy," Journal of information security & application, 19, 209-223, 2014.
[33]Marimuthu Karuppiah and R. Saravanan, "A secure remote user mutual authentication scheme using smart cards," Journal Of Information Security And Application, Vol.19, 282-294, 2014.
[34]Nassima Kamel and Jean-Louis Lanet (2013). Risks induced by Web applications on smart cards, Journal of Information Security & Application, 18, 148-156.
[35]O’ Reilly. (1995). Essential of system administration. O’ Reilly Media. USA
[36]Paul Love & Paul Weinstein (2005). Beginning Unix, New Delhi India, Wiley India.
[37]Pressman. (2001). Software engineering. New Delhi, India: Tata McGraw Hill.
[38]Poorna Chandra, Sarang.(2009). Object Oriented Programming with C. Delhi, India: PHI.
[39]Ravichandran, D.(2009). Programming with C++. New Delhi, India: Tata McGraw Hill.
[40]Robert, Lafore. (2002). Object Oriented Programming in C++. New Delhi: Person India.
[41]Shon, H. (2002). Security mgmt practices. New Delhi, India: Wiley Publishing Inc.
[42]Stephane Paul, Raphae and Vignon-Davillier, "Unifying traditional risk assessment approaches with attack trees," Journal of information security & application, Vol. 19, 165-181, 2014.
[43]Seyed.H. Roosta.(2004). Foundation of Programming Languages Design & Implementation. Delhi: Cengage 2004.
[44]Shujun Li, Konra Rieckand Alan Woodward, "Special issue on threat detection, analysis and defense," Journal Of Information Security and Application Vol. 19, 163-164, 2014.
[45]Srimanta Pal .(2011). System Programming “ Delhi: Oxford University Press.
[46]Sumitabh, Das. (2009). UNIX system V UNIX concept & application. Delhi, India: Tata McGraw Hill.
[47]Sun-Microsystems. (2002). UNIX Sun Solaris system administration. USA,
[48]Stalling, William. (2006). Cryptography and network security. New Delhi, India: Person India.
[49]Stalling. (2009). Operating System Internals & Design Principle. New Delhi, India: Person India.
[50]Stephen Prata (1986). Advanced Unix Prammer Guide, New Delhi India, BPB Publication.
[51]Tanenbaum. (2010). Operating System Design And Implementation. New Delhi, India: Person Education India (PHI).
[52]Tanenbaum. (2009). Computer Network. New Delhi, India: Person Education India (PHI).
[53]Tiago and Ant?nio Augusto (2014). A meta-programmed C++ framework for hardware/software component integration and communication," Journal of Systems Architecture Vol. 60, 816–827.
[54]Weber, Ron. (2002). Information system control & audit. New Delhi, India: Person Education India (PHI).
[55]Younis A. Younis, Kashif Kifayat and Madjid Merabti, "An access control model for cloud computing,"Journal Of Information Security And Application.Vol.19, 45-60, 2014.