Trusted Operating System Approach for Security of an OS with JAVA
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 1, Issue 7
Abstract
In a little more than a decade since the inception of the Java language, the Java ecosystem has evolved into one that businesses around the world look to for secure, ro enterprise. Java was created to be exploited in highly distributed environments. The portability of the language meant that security had to be incorporated in the very first steps of Java applicati application users could be assured that the code they obtained was secure and had not been tampered with during transmission. This paper explains how to achieve that security. This paper explores the integrated Java platform security that results from the synergy of these two world JVM operates above the operating system security services, meaning that Java Security is actually implemented in the JVM run-time environment. The privileges to be given at the host operating system level to the Java applications execution streams are well established and fully controlled. The paper describes the Java security model as implemented in the z/OS JVM™. In this paper we are also discussin paper will give the brief description of RACF & its groups with respect to z/OS. In this paper we are trying to integrate the JAVA security with the security of an OS. This paper will explain about the OS Secu its terminology, RACF, JNI & Security, & Trusted Operating System. General Terms: Security, Trusted OS, JAVA, JNI, Levels.
Authors and Affiliations
Gaurav Indoria
THE EFFECT OF PROJECT LIFE CYCLE’S STAGES ON SUDANESE CONSTRUCTION PROJECTS
The Sudanese construction sector is characterized by many small and large projects and high labor intensity, and accounted for 3.2% of the Sudanese country’s GDP. The basic problem which had faced the Sudanese constr...
Synthesis, Characterization and A.C. Conductivity Study of Polypyrrole/Zinc Tungstate (Ceramic) Composites
In-situ polymerization of pyrrole (Py) was carried out with Zinc Tungstate (ceramic) in the presence of oxidizing agent ammonium persulphate to synthesize polypyrrole (PPy)/Zinc Tungstate (ZnWO4) by chemical oxid...
Cluster Based Stretch and Shrink Method for Manet Using Load Balancing, Nearest Neighbor and Rule Mining
Mobile Ad hoc Network is a collection of autonomous wireless nodes, in which each node changes its geographical position frequently and acts as a router to forward packets. The topology stability and network scal...
Toward A Hi-Fi Wireless Sensor Network for Rehabilitation Supervision
Habitually a sensor for rehabilitation is a custom field in a medical applications, wireless sensors is fetching a great interest in medical applications for handling abundance work in the field of biomedical and...
Performance of Biomass Adsorber Column for Competitive Removal Pb(II), Cr(III) and Cd(II) ions from Synthetic Wastewater
The adsorption of Pb(II), Cr(III) and Cd(II) onto dead anaerobic biomass (DAB) in single, binary and ternary system was studied using fixed bed adsorber. A general rate multi- component model (GRM) was utilized to...