computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are...
12 KB (1,106 words) - 05:47, 16 April 2025
This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved...
4 KB (327 words) - 06:18, 5 May 2025
Secure operating system may refer to: Security-focused operating system Security-evaluated operating system, operating systems that have achieved certification...
459 bytes (83 words) - 15:16, 7 November 2013
Common Criteria Comparison of operating systems Security-evaluated operating system Security-focused operating system List of member of the Common Criteria...
4 KB (395 words) - 06:48, 14 February 2025
Trusted Solaris (category Operating system security)
Trusted Solaris is a discontinued security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model...
5 KB (506 words) - 14:59, 9 May 2025
almost solely on the core kernel. Other operating systems, such as Windows, macOS or Linux, though evaluated at lower levels of assurance, generally include...
5 KB (307 words) - 22:17, 25 January 2025
Solaris Trusted Extensions (category Operating system security)
family of security-evaluated operating systems based on earlier versions of Solaris. Solaris 10 5/09 is Common Criteria certified at Evaluation Assurance...
4 KB (413 words) - 00:02, 11 May 2025
R2, z/OS version 2.1 and z/VM version 6.3. Operating systems that provide multilevel security are evaluated at a minimum of EAL4. Examples with active...
17 KB (1,780 words) - 14:48, 17 May 2025
effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered...
18 KB (2,124 words) - 19:40, 25 May 2025
including operating systems, access control systems, databases, and key management systems. Common Criteria evaluations are performed on computer security products...
30 KB (3,769 words) - 00:01, 9 April 2025
classes of operating systems (special-purpose operating systems), such as embedded and real-time systems, exist for many applications. Security-focused operating...
70 KB (8,176 words) - 14:39, 31 May 2025
user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing...
14 KB (1,668 words) - 22:55, 12 June 2025
policies, security policies, employee termination policies, system operating procedures and an overview of operating systems. Physical security / environmental...
31 KB (4,033 words) - 11:39, 11 May 2025
computer operating systems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operating systems. 1951...
70 KB (3,408 words) - 11:01, 5 June 2025
XTS-400 (redirect from Secure Trusted Operating Program)
x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version...
17 KB (2,239 words) - 15:01, 19 December 2024
Reference monitor (category Operating system security)
the mechanism itself and hence violate the security policy. For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas...
4 KB (567 words) - 00:07, 7 July 2023
products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified to a high evaluated assurance level:...
31 KB (4,178 words) - 04:23, 8 March 2025
Labs into operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. The name of the operating system, many of...
20 KB (1,981 words) - 09:11, 9 May 2025
Protection Profile (category Computer security procedures)
that could protect information, evaluated their strength, and mapped security features needed for specific operating environment risks. The results were...
5 KB (604 words) - 15:51, 7 April 2025
hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential...
18 KB (1,870 words) - 03:36, 6 June 2025
Project for the FreeBSD and Darwin operating systems. Security-Enhanced Linux implements the Flux Advanced Security Kernel (FLASK). Such a kernel contains...
36 KB (3,661 words) - 06:42, 3 April 2025
including lower level mechanisms to bypass the security monitor. Evaluatable: any trusted component can be evaluated to the level of assurance required of that...
6 KB (606 words) - 21:12, 11 June 2025
their systems. One use of the term computer security refers to technology that is used to implement secure operating systems. Using secure operating systems...
220 KB (22,314 words) - 10:38, 16 June 2025
Bharat Operating System Solutions (BOSS GNU/Linux) is an Indian Linux distribution based on Debian. The latest stable release is 10.0 (Pragya), which was...
9 KB (679 words) - 23:22, 2 June 2025
In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software...
10 KB (999 words) - 16:44, 26 May 2025
Oracle Solaris (redirect from Solaris operating system)
Oracle Solaris is a proprietary Unix operating system offered by Oracle for SPARC and x86-64 based workstations and servers. Originally developed by Sun...
78 KB (6,037 words) - 08:07, 13 June 2025
IEC 62443 (category Computer security standards)
Technical requirements for systems (IEC 62443-3-3) and products (IEC 62443-4-2) are evaluated in the standard by four so-called Security Levels (SL). The different...
20 KB (2,121 words) - 04:42, 9 January 2025
Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS, or Micrium OS) is a real-time operating system (RTOS) designed by Jean J. Labrosse in...
19 KB (2,259 words) - 04:11, 17 May 2025
Mandatory access control (category Operating system security)
computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database)...
23 KB (2,601 words) - 13:55, 24 May 2025
Hypervisor (section Operating system support)
hypervisor presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating systems. Unlike an emulator,...
25 KB (2,946 words) - 15:04, 21 February 2025