Loading

A Novel Perspective for Organizing the Conflicting Security Tasks in a Dynamically Distributed Systems Environment
GSN Murthy1, T. Veerraju2, T. Satya Kumari3, V. Anantha Lakshmi4

1Dr.G.S.N Murthy*, Professor, Dept of CSE, Aditya College of Engineering, Surampalem, India.
2T.Veerraju, Associate Professor, Dept of CSE, Aditya College of Engineering , Surampalem, India.
3T.Satya Kumari, Assistant Professor Dept of CSE, Aditya College of Engineering, Surampalem, India.
4V.Anantha Lakshmi, Associate Professor, Dept of CSE, Aditya College of Engineering, Surampalem, India.
Manuscript received on December 12, 2019. | Revised Manuscript received on December 23, 2019. | Manuscript published on January 10, 2020. | PP: 3652-3657 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8636019320/2020©BEIESP | DOI: 10.35940/ijitee.C8636.019320
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Distributed systems environment comprises set of Hosts, workstations, terminals, Different Servers, bridges, Gateways, printers and so on. The sharing of resources and information in this distributed systems and networking environment increases day-by-day. This is more and more prone to attacks and hazards. Now-a-days, as threats become more widespread, attackers get smarter and the infrastructure required securing. Hence, in large systems, it is essential to distribute the management tasks by defining the security policies by the systems manager for controlling, monitoring and organizing employee’s access. In some cases, it is possible to employee’s tasks may conflict or overlap. To avoid this, we present a Novel approach for organizing Conflicting Security tasks that has been specifically designed with consistency. It organizes tasks into a tree shaped structure to maintain significant representation. 
Keywords: Conflicting, Privacy, Security Policy, Task.
Scope of the Article: Environmental Engineering