Trusted Operating System Approach for Security of an OS with JAVA

Abstract

In a little more than a decade since the inception of the Java language, the Java ecosystem has evolved into one that businesses around the world look to for secure, ro enterprise. Java was created to be exploited in highly distributed environments. The portability of the language meant that security had to be incorporated in the very first steps of Java applicati application users could be assured that the code they obtained was secure and had not been tampered with during transmission. This paper explains how to achieve that security. This paper explores the integrated Java platform security that results from the synergy of these two world JVM operates above the operating system security services, meaning that Java Security is actually implemented in the JVM run-time environment. The privileges to be given at the host operating system level to the Java applications execution streams are well established and fully controlled. The paper describes the Java security model as implemented in the z/OS JVM™. In this paper we are also discussin paper will give the brief description of RACF & its groups with respect to z/OS. In this paper we are trying to integrate the JAVA security with the security of an OS. This paper will explain about the OS Secu its terminology, RACF, JNI & Security, & Trusted Operating System. General Terms: Security, Trusted OS, JAVA, JNI, Levels.

Authors and Affiliations

Gaurav Indoria

Keywords

Related Articles

 Analysis, Design and Simulation of 12v/24v Boost Switching Converter

 The objective of this paper is to analyze, design and simulate the Boost (step-up) switching converter which is one of the main parts of solar electric system. The converter performance such as load voltage, curre...

REVERSE ENGINEERING OF A STEAM TURBINE ROTOR BLADE FOR ITS ANALYSIS

Reverse engineering is the process of making a solid model of a component that has been manufactured already and is available. This paper outlines the process procedure in creating a solid model of a steam turbine rotor...

 Design and Development of Soft Computing Model for Teaching Staff Performance Evaluation

 The evaluation of teacher’s performance is especially important for the academic institutions. Academic institutes use Performance Based Appraisal System to evaluate teaching staffs which involves awarding scores...

ENHANCEMENT OF FLEXURAL STRENGTH ON REINFORCED CONCRETE BEAMS WRAPPED WITH GLASS FIBRE REINFORCED POLYMER

Reinforced Concrete (RC) structures are designed for a particular load carrying capacity and they are expected to function safely during their service life. Several strengthening methods are being adopted to extend the...

 STUDY THE EFFECT OF TENSILE STRENGTH IN SINGLE SIDED FRICTION STIR WELDING ON AA6063 ALUMINIUM ALLOY

 Friction stir welding is a technique in which the work pieces are joined by profits of frictional heating and plastic deformation indeed a temperature below the melting point of the material to be joint. AA6063 is...

Download PDF file
  • EP ID EP117462
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

Gaurav Indoria (30). Trusted Operating System Approach for Security of an OS with JAVA. International Journal of Engineering Sciences & Research Technology, 1(7), 361-368. https://europub.co.uk/articles/-A-117462