عنوان مقاله [English]
Nowadays, due to the large amount of information and the need of rapid processing, the need for computers with up-to-date and efficient operating systems with high processing power is felt. During the last decades, progress in the field of information technology has made available fast distribution systems. Distributed systems are one of the best solutions to achieve the above goal. By placing computer systems on the platform of the distribution network, it is possible to create a high processing power, whose complexity and organization are hidden from the eyes of users and in addition, it brings us the availability of resources and scalability. Securing the core of distributed operating systems is a necessity that can help improve the security of information technology in distributed network environments. In order to fundamentally implement this process, it is necessary to create an expert security team. Also, in addition to the technical review and the implementation of protection settings and access controls, there is a need to develop new methods and tools to study the sequence of certain or possible protection operations in the core of distributed operating systems. In this article, we are going to examine the security aspects in the core of distributed operating systems.