Securing Operating System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities discovered so far are rooted from the bugs or deficiency of underneath operating systems. This paper discusses the security (or lack of security) of most commercial operating systems like Unix and Microsoft Windows, and its effect to the overall security of Web based applications and services. Based on DOD’s trusted computer system model, the current effort toward development of secure operating systems is presented, and as a case study, the publicly available security enhanced Linux, SE-Linux, is also analysed.
Authors and Affiliations
Sahil Jindal, Praveen Rohilla, Puneet Gulati
Drug-Drug Interaction Studies of Ibutilide Fumarate with Verapamil and Stability Indicating Method by Chromatographic Techniques
the aim of the present work is to study interactions of ibutilide fumarate with the antihypertensive drug verapamil at physiological ph 7.4 and temperature 37oc under simulated condition and using commercially procured...
To Study the Variation in Compressive and Split Tensile Strength of Concrete by Using Various Binders
This paper accentuates the effect of bentonite, sugarcane molasses, jaggery and polyvinyl acetate on strength properties of concrete. The experimentation has been carried out to assess the strength properties of concret...
Analysis of Multipurpose Buildings with Infill Walls
It is common practice by structural engineer to consider the infill panels as non-structural member and their stiffness contribution in structure is neglected. A multipurpose building is one which can be used for more t...
slugPower Efficient Location Based Routing
In wireless ad - hoc networks, there are several characteristics different among wired networks. The differences are varying of network topology, limited resources like bandw idth and energy...
Implementation of Enhancement of Apriori Algorithm
As with the advancement of the IT technologies, the amount of accumulated data is also increasing. It has resulted in large amount of data stored in databases, warehouses and other repositories. Thus the Data mining com...