Securing Operating System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities discovered so far are rooted from the bugs or deficiency of underneath operating systems. This paper discusses the security (or lack of security) of most commercial operating systems like Unix and Microsoft Windows, and its effect to the overall security of Web based applications and services. Based on DOD’s trusted computer system model, the current effort toward development of secure operating systems is presented, and as a case study, the publicly available security enhanced Linux, SE-Linux, is also analysed.
Authors and Affiliations
Sahil Jindal, Praveen Rohilla, Puneet Gulati
Inventory Reduction Using Analytic Hierarchy Process in an Automotive Industry
The main objective of this paper is to present about a model which was developed for finding the total inventory cost for a leading two wheeler manufacturer in south India. The model was developed using basic Economic O...
slugBat Algorithm for Resource Scheduling In Cloud Computing
Scheduling of resources is a complicated process in cloud computing because of the heterogeneous nature of the cloud and multiple copies of same task is given to multiple computers. Therfore in this pap...
Efficient Clustering Technique for Information Retrieval in Data Mining
In the emerging new wave of applications where people are the ultimate target of text clustering methods, cluster labels are intended to be read and comprehended by humans. The primary objective of a clustering method s...
Repurchase Model for Telecom Customers
Intensified competition and frequent shifting of customer base for fixed- line telecom service providers, in the recent years, has increased the necessity for better targeting and segmenting prospects and customers, for...
A Review on Enhancing the Performance of MPPT for Single Stage PV-Grid Connected System Using Particle Swarm Optimization Technique
The scaling of maximum power point tracking (MPPT) system is suggested. The optimal operating point of a solar module is known as the maximum power point (MPP) and it changes with its own characteristic as well as cell...