Skip to main content
  • Arman Process Journal (APJ), is an open access double-blind peer-reviewed publication which is published by
    Islamic Azad University, Khodabandeh Branch, Zanjan
    concerned with new concepts and innovative technologies in "color, coating science and technology".  APJ is a quarterly publication, which publishes original research papers related to journal scope. All submitted manuscripts are checked for similarity through Hamyab software to ensure their authenticity to be assured about its originality and then rigorously peer-reviewed by the expert reviewers.edit
Nowadays, due to the large amount of information and the need of rapid processing, the need for computers with up-to-date and efficient operating systems with high processing power is felt. During the last decades, progress in the field... more
Nowadays, due to the large amount of information and the need of rapid processing, the need for computers with up-to-date and efficient operating systems with high processing power is felt. During the last decades, progress in the field of information technology has made available fast distribution systems. Distributed systems are one of the best solutions to achieve the above goal. By placing computer systems on the platform of the distribution network, it is possible to create a high processing power, whose complexity and organization are hidden from the eyes of users and in addition, it brings us the availability of resources and scalability. Securing the core of distributed operating systems is a necessity that can help improve the security of information technology in distributed network environments. In order to fundamentally implement this process, it is necessary to create an expert security team. Also, in addition to the technical review and the implementation of protection settings and access controls, there is a need to develop new methods and tools to study the sequence of certain or possible protection operations in the core of distributed operating systems. In this article, we are going to examine the security aspects in the core of distributed operating systems.