• computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are...
    12 KB (1,106 words) - 05:47, 16 April 2025
  • This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved...
    4 KB (327 words) - 06:18, 5 May 2025
  • Secure operating system may refer to: Security-focused operating system Security-evaluated operating system, operating systems that have achieved certification...
    459 bytes (83 words) - 15:16, 7 November 2013
  • Common Criteria Comparison of operating systems Security-evaluated operating system Security-focused operating system List of member of the Common Criteria...
    4 KB (395 words) - 06:48, 14 February 2025
  • Trusted Solaris (category Operating system security)
    Trusted Solaris is a discontinued security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model...
    5 KB (506 words) - 14:59, 9 May 2025
  • almost solely on the core kernel. Other operating systems, such as Windows, macOS or Linux, though evaluated at lower levels of assurance, generally include...
    5 KB (307 words) - 22:17, 25 January 2025
  • Solaris Trusted Extensions (category Operating system security)
    family of security-evaluated operating systems based on earlier versions of Solaris. Solaris 10 5/09 is Common Criteria certified at Evaluation Assurance...
    4 KB (413 words) - 00:02, 11 May 2025
  • Thumbnail for Trusted Computer System Evaluation Criteria
    effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered...
    18 KB (2,124 words) - 19:40, 25 May 2025
  • R2, z/OS version 2.1 and z/VM version 6.3. Operating systems that provide multilevel security are evaluated at a minimum of EAL4. Examples with active...
    17 KB (1,780 words) - 14:48, 17 May 2025
  • including operating systems, access control systems, databases, and key management systems. Common Criteria evaluations are performed on computer security products...
    30 KB (3,769 words) - 00:01, 9 April 2025
  • Thumbnail for Operating system
    classes of operating systems (special-purpose operating systems), such as embedded and real-time systems, exist for many applications. Security-focused operating...
    70 KB (8,176 words) - 14:39, 31 May 2025
  • user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing...
    14 KB (1,668 words) - 22:55, 12 June 2025
  • computer operating systems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operating systems. 1951...
    70 KB (3,408 words) - 11:01, 5 June 2025
  • policies, security policies, employee termination policies, system operating procedures and an overview of operating systems. Physical security / environmental...
    31 KB (4,033 words) - 11:39, 11 May 2025
  • products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified to a high evaluated assurance level:...
    31 KB (4,178 words) - 04:23, 8 March 2025
  • x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version...
    17 KB (2,239 words) - 15:01, 19 December 2024
  • Reference monitor (category Operating system security)
    the mechanism itself and hence violate the security policy. For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas...
    4 KB (567 words) - 00:07, 7 July 2023
  • Thumbnail for Inferno (operating system)
    Labs into operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. The name of the operating system, many of...
    20 KB (1,981 words) - 09:11, 9 May 2025
  • Protection Profile (category Computer security procedures)
    that could protect information, evaluated their strength, and mapped security features needed for specific operating environment risks. The results were...
    5 KB (604 words) - 15:51, 7 April 2025
  • hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential...
    18 KB (1,870 words) - 03:36, 6 June 2025
  • Thumbnail for Security-Enhanced Linux
    Project for the FreeBSD and Darwin operating systems. Security-Enhanced Linux implements the Flux Advanced Security Kernel (FLASK). Such a kernel contains...
    36 KB (3,661 words) - 06:42, 3 April 2025
  • including lower level mechanisms to bypass the security monitor. Evaluatable: any trusted component can be evaluated to the level of assurance required of that...
    6 KB (606 words) - 21:12, 11 June 2025
  • Thumbnail for Computer security
    their systems. One use of the term computer security refers to technology that is used to implement secure operating systems. Using secure operating systems...
    220 KB (22,314 words) - 10:38, 16 June 2025
  • Bharat Operating System Solutions (BOSS GNU/Linux) is an Indian Linux distribution based on Debian. The latest stable release is 10.0 (Pragya), which was...
    9 KB (679 words) - 23:22, 2 June 2025
  • Thumbnail for Oracle Solaris
    Oracle Solaris is a proprietary Unix operating system offered by Oracle for SPARC and x86-64 based workstations and servers. Originally developed by Sun...
    78 KB (6,037 words) - 08:07, 13 June 2025
  • In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software...
    10 KB (999 words) - 16:44, 26 May 2025
  • Mandatory access control (category Operating system security)
    computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database)...
    23 KB (2,601 words) - 13:55, 24 May 2025
  • IEC 62443 (category Computer security standards)
    Technical requirements for systems (IEC 62443-3-3) and products (IEC 62443-4-2) are evaluated in the standard by four so-called Security Levels (SL). The different...
    20 KB (2,121 words) - 04:42, 9 January 2025
  • Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS, or Micrium OS) is a real-time operating system (RTOS) designed by Jean J. Labrosse in...
    19 KB (2,259 words) - 04:11, 17 May 2025
  • hypervisor presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating systems. Unlike an emulator,...
    25 KB (2,946 words) - 15:04, 21 February 2025