Trusted Operating System Approach for Security of an OS with JAVA

Abstract

In a little more than a decade since the inception of the Java language, the Java ecosystem has evolved into one that businesses around the world look to for secure, ro enterprise. Java was created to be exploited in highly distributed environments. The portability of the language meant that security had to be incorporated in the very first steps of Java applicati application users could be assured that the code they obtained was secure and had not been tampered with during transmission. This paper explains how to achieve that security. This paper explores the integrated Java platform security that results from the synergy of these two world JVM operates above the operating system security services, meaning that Java Security is actually implemented in the JVM run-time environment. The privileges to be given at the host operating system level to the Java applications execution streams are well established and fully controlled. The paper describes the Java security model as implemented in the z/OS JVM™. In this paper we are also discussin paper will give the brief description of RACF & its groups with respect to z/OS. In this paper we are trying to integrate the JAVA security with the security of an OS. This paper will explain about the OS Secu its terminology, RACF, JNI & Security, & Trusted Operating System. General Terms: Security, Trusted OS, JAVA, JNI, Levels.

Authors and Affiliations

Gaurav Indoria

Keywords

Related Articles

 Analytical and Experimental Study of Buckling Behavior of Cylindrical Panels

 Thin walled structural components such as plates and shells are used in several applications like aerospace, naval, nuclear plant, pressure vessels, mechanical and civil structures due to their high strength to we...

 CONTROLLING PC THROUGH MOBILE PHONE

 As all are familiar with both mobile phones and computer like home PC, laptop etc. and also all are having mobile phone with high and low prices. We know that computer can be controlled by a user by using client s...

 OPTIMIZATION OF CUTTING PARAMETERS TO IMPROVE SURFACE ROUGHNESS OF AL 1070 IN TURNING OPERATION USING TAGUCHI METHOD

 Recently the concept of hard turning has gained much attention in the metal cutting industry. In hard turning, multiple operations can be performed in single step, thereby it replaces the traditional process c...

 Voltage Swell mitigation in Wind Farm System

 As the wind power penetration into the grid is increasing quickly, the influence of wind turbine on the power quality is becoming an important issue. Wind power penetration is the impact on power system stability....

 Performance Enhancement of Household Refrigerators with Cooling of Compressor: A Review

 This paper presents a review of experimental tests carried out to investigate the performance of a household refrigerator. The purpose of this review paper is to summarize the important published papers on the enh...

Download PDF file
  • EP ID EP117462
  • DOI -
  • Views 78
  • Downloads 0

How To Cite

Gaurav Indoria (30). Trusted Operating System Approach for Security of an OS with JAVA. International Journal of Engineering Sciences & Research Technology, 1(7), 361-368. https://europub.co.uk/articles/-A-117462