Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

A Survey on Operating System Challenges and Security Issues Associate to it

Profile image of IJSRD - International Journal for Scientific Research and Development

— An operating system (OS) is generally containing of software that operates computer hardware resources and provides some basic services for computer programs. The operating system is a vital component of the system software in a computer system. In simple word operating system acts as an intermediate between the user and hardware. Now –a-days operating system plays an important role for processing the system. It is the first thing that is freighted in to memory. It takes a main role to release the burden from application programmers during the process of different application. It also behaves as an interface as an host for computing paradigms. Operating system offers multiple numbers of services to different application programmes and users. This paper aims to provide a brief idea about different challenges and security issues of operating system and also discusses how to optimize the work of operating system which will be helpful for enhancing the performance of the system.

Related Papers

IJCSMC Journal

As the computer industry advanced so much and it has more complexities, Operating System responsibilities has increased, and give challenge to the operating system developers to build a secure operating system. In this paper we will se operating system security issues computer industry has faced in desktop and mobile area. And we are proposing a general idea to improve all operating systems for security.

research paper on operating system security pdf

Rehmat -E-Bari Wajeeha , Wajeeha Wajeeha

As the computer industry advanced so much and it has more complexities, Operating System responsibilities has increased, and give challenge to the operating system developers to build a secure operating system. In this paper we will see operating system security issues computer industry has faced in desktop and mobile area. And we are proposing a general idea to improve all operating systems for security.

International Journal of Trend in Scientific Research and Development

Sumanta Kabiraj

james martin

Asian Journal of Reasearch in Computer Science

Bazuku Robert

This article presents an overview of computer operating systems (OS) and emerging trends. OS is simply defined as an interface between computer hardware and the user. The objective of the study is to investigate the emerging trends of OS and to find out the direction of OS for modern computing systems. To achieve this goal the paper looks at the concepts of OS, its underlying architectures and evolution. The papers also outline the components of the OS provide knowledge on security issues with OS architectures and provide best practices to secure OS. The paper found out that the current trends in OS include IoT OS, Cloud OS, AI-powered OS, Blockchain OS, Hybrid OS and Container OS. The paper compares the strengths and weaknesses of the major OS. The Paper proposes a double-layer security approach where the OS is hardened with security policies and embedding security protocols in the Hardware architecture of the OS. It was discovered that

Karen Pinto 18BCE0596

This paper presents a comparative survey of three well known operating systems which are Windows, Linux, and Macintosh. The basic criteria for studying them are mostly focusing on the fundamental memory and file management, architecture, security, versatility and other topics. These topics are being compared in this paper. This research study gives us an overview of the main topics and on the various similarities and differences in the basic use of operating systems. Every operating system has its own set of differences in the composition and structure of the operating system and this study focuses on the underlying strengths and weaknesses of each operating system.

Operating System

Dominic Tomking

kunal abhishek

Priyanshu Sharma

Introduction to Operating System

Nurrachman Budi Mulya

A computer system has many resources (hardware and software), which may be require to complete a task. The commonly required resources are input/output devices, memory, file storage space, CPU etc. The operating system acts as a manager of the above resources and allocates them to specific programs and users, whenever necessary to perform a particular task. Therefore operating system is the resource manager i.e. it can manage the resource of a computer system internally. The resources are processor, memory, files, and I/O devices. An operating system is the interface between the user and the machine. Before there were operating systems, people only used computers using analog signals and digital signals. Along with the development of knowledge and technology, at this time there are various operating systems with their respective advantages.

RELATED PAPERS

UGAH, John Otozi 1,

Publisher ijmra.us UGC Approved

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

ALI MOULAEI NEJAD

Michael Effinger

Plawan Rath

Ugur Agansoy

Tigran Terpandjian

Sujith Kanagarajan

Lahore Garrison University Research Journal of Computer Science and Information Technology

Ayesha Nasir

Computer and Information Science

Daniyal Alghazzawi

Computer Networks (1976)

Andrew S Tanenbaum

Sotiris Ioannidis

Youssef Bassil

Jonathan Avery

Khalid M Awan

Arti Kumari

Emerging Science Journal

kiarash aghakhani

Ayshwarya Baburan

Yashnath Pandey

Communications of the ACM

Walter L. Ruzzo

Muhammad Asad

ACM Transactions on Information and System Security

M Bernaschi

Dr. (smt). Mallamma V Reddy

Lecture Notes in Computer Science

Raúl Durán Díaz

Asian Journal of Research in Computer Science

mohammed abdulrazaq

Proceedings Third International Workshop on Object Orientation in Operating Systems

Gernot Heiser

2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops

MEJ. Mansoura Engineering Journal

Mofreh Salem

Proceedings. 1988 IEEE Symposium on Security and Privacy

Valentine J Owan

Ijesrt Journal

Abisola Coker

Jonathan Smith

Ellick Chan

Eduardo Fernandez

Rodrigo Rodrigues

Raphael Finkel

International Journal of Academic Research in Business, Arts and Science (IJARBAS.COM)

International Journal of Academic Research in Business, Arts & Science (IJARBAS) , umaima khan

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2023

IMAGES

  1. Research Paper On Applications Of Cyber Security

    research paper on operating system security pdf

  2. Operating system security by integrity checking and recovery using

    research paper on operating system security pdf

  3. (PDF) SECURITY SURVEY OF FAMOUS OPERATING SYSTEMS

    research paper on operating system security pdf

  4. Guide to Operating Systems Security by Michael J. Palmer

    research paper on operating system security pdf

  5. Chapter 1 Introduction to Computer Security

    research paper on operating system security pdf

  6. [PDF] Notes on Operating Systems free tutorial for Beginners

    research paper on operating system security pdf

VIDEO

  1. Introduction To Information System Lecture(5)~Dr-Rania Ragab

  2. Engineering Secure Information Systems

  3. Internship Meeting Recording

  4. Introduction to information Systems

  5. Question Paper of Operating System for B.Sc Computer Science Semester II/B.A Students

  6. FedVTE Windows Operating System Security Questions and Answers Already Passed

COMMENTS

  1. Why Won’t a PDF File Open?

    The reason for a PDF file not to open on a computer can either be a problem with the PDF file itself, an issue with password protection or non-compliance with industry standards. It could also be an issue with the PDF reader being used, Acr...

  2. What Does PDF Mean?

    In the world of technology, PDF stands for portable document format. The purpose of this format is to ensure document presentation that is independent of hardware, operating systems or application software.

  3. How to Get the Most Out of Your Computer by Installing PDF for Free

    PDF, or Portable Document Format, is a popular file format used for creating and sharing documents. It provides a universal platform for sharing information across different devices and operating systems.

  4. (PDF) Issues of Operating Systems Security

    Content may be subject to copyright. ResearchGate Logo. Discover the world's research. 25+ million members; 160+ million publication pages

  5. (PDF) A Security-Privacy Based Model for Operating Systems

    Content may be subject to copyright. ResearchGate Logo. Discover the world's research. 25+ million members; 160+ million publication pages

  6. A Survey of Security Research for Operating Systems

    In this paper, the results of the sur- vey of virtualization technologies, operating system verification technologies, and access control technologies are

  7. Operating Systems Security

    operating systems. This paper is a review on the security and lack of it in the most commercial operating systems like UNIX and Microsoft. Windows, and its

  8. A Survey on Operating System Challenges and Security Issues

    And we are proposing a general idea to improve all operating systems for security. Download Free PDF View PDF. International Journal of Trend in Scientific

  9. Operating System Security and Secure Operating Systems

    research of secure operating systems. Architecture. The SE-Linux is an

  10. Comparative study of operating system security using SELinux and

    This thesis makes a comparative study of the security systems. Systrace (used primarily with OpenBSD) and SELinux (used exclusively with Linux), trying to

  11. Introduction to Operating System Security

    A highly influential paper, particularly their codification of principles for secure system design.

  12. Sub-Operating Systems: A New Approach to Application Security

    rest of this paper. The

  13. Observations on Operating System Security Vulnerabilities

    Security Evolution of a Network Operating System. In this paper, we study the security evolution of Novell NetWare from version 3.12 until the most recent

  14. Operating System Security

    A Survey of Security Research for Operating Systems · Masaki Hashimoto.