Security in distributed Environment Securities strategies must be as drivers and customized as are indivisible computing environment. Many e large organisation have a vast number of computers in use in many different areas. To computing functions typically report to several different part of the organisation rather than to a centralized system or security group. Yet most security function will attempts to operate as a centralized control and support function. The security function has been centralized focus because- The client for user areas do not have the expertise them selves. The Client or user areas do not fully accept or understand security requirements. The Client or user areas cannot provides the necessary level of Reliability in terms of process and counter balances. The system supports functions are largely centralized. Although these argument may be legitimate they can no longer be used to justify...
Single partition allocation, Multiple-partition allocation and Fixed Equal-size partitions in operating system-computer world
Single partition allocation, Multiple-partition allocation and Fixed Equal-size partitions in operating system Single partition allocation In this scheme operating system is residing in law memory and user process are executing in higher memory. Advantages It is simple It is easy to understand and use Disadvantages User job is limited to the size of available memory. It leads to poor Utilization of processor and memory. Multiple-partition allocation It is the simplest method for allocating memory is divided memory into several fixed size partitions. Fixed Equal-size partitions It divides the main memory Into equal number of fixed sized partitions, operating system occupies some fixed portion and remaining portion of main memory is available for user processes. Advantages It supports multi programming. A process whose size is less then or equal to the partitions size can be loaded into any available partition. Disadvantages If a program is big to fit in...