• computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are...
    12 KB (1,106 words) - 19:34, 29 June 2025
  • This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved...
    4 KB (327 words) - 06:18, 5 May 2025
  • Secure operating system may refer to: Security-focused operating system Security-evaluated operating system, operating systems that have achieved certification...
    459 bytes (83 words) - 15:16, 7 November 2013
  • Common Criteria Comparison of operating systems Security-evaluated operating system Security-focused operating system List of member of the Common Criteria...
    4 KB (395 words) - 06:48, 14 February 2025
  • Trusted Solaris (category Operating system security)
    Trusted Solaris is a discontinued security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model...
    5 KB (506 words) - 14:59, 9 May 2025
  • almost solely on the core kernel. Other operating systems, such as Windows, macOS or Linux, though evaluated at lower levels of assurance, generally include...
    5 KB (307 words) - 22:17, 25 January 2025
  • Solaris Trusted Extensions (category Operating system security)
    family of security-evaluated operating systems based on earlier versions of Solaris. Solaris 10 5/09 is Common Criteria certified at Evaluation Assurance...
    4 KB (413 words) - 00:02, 11 May 2025
  • R2, z/OS version 2.1 and z/VM version 6.3. Operating systems that provide multilevel security are evaluated at a minimum of EAL4. Examples with active...
    17 KB (1,780 words) - 09:15, 20 July 2025
  • including operating systems, access control systems, databases, and key management systems. Common Criteria evaluations are performed on computer security products...
    30 KB (3,768 words) - 21:39, 10 July 2025
  • Thumbnail for Operating system
    classes of operating systems (special-purpose operating systems), such as embedded and real-time systems, exist for many applications. Security-focused operating...
    70 KB (8,177 words) - 07:24, 23 July 2025
  • user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing...
    14 KB (1,668 words) - 22:55, 12 June 2025
  • Thumbnail for Inferno (operating system)
    Labs into operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. The name of the operating system, many of...
    21 KB (2,104 words) - 12:54, 3 August 2025
  • Reference monitor (category Operating system security)
    the mechanism itself and hence violate the security policy. For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas...
    4 KB (567 words) - 00:07, 7 July 2023
  • Thumbnail for Trusted Computer System Evaluation Criteria
    effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered...
    18 KB (2,124 words) - 19:40, 25 May 2025
  • x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version...
    17 KB (2,247 words) - 08:57, 17 July 2025
  • products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified to a high evaluated assurance level:...
    31 KB (4,178 words) - 04:23, 8 March 2025
  • policies, security policies, employee termination policies, system operating procedures and an overview of operating systems. Physical security / environmental...
    31 KB (4,033 words) - 11:39, 11 May 2025
  • computer operating systems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operating systems. 1951...
    70 KB (3,407 words) - 09:10, 21 July 2025
  • including lower level mechanisms to bypass the security monitor. Evaluatable: any trusted component can be evaluated to the level of assurance required of that...
    6 KB (606 words) - 21:12, 11 June 2025
  • Thumbnail for Security-Enhanced Linux
    Project for the FreeBSD and Darwin operating systems. Security-Enhanced Linux implements the Flux Advanced Security Kernel (FLASK). Such a kernel contains...
    36 KB (3,634 words) - 14:26, 4 August 2025
  • hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential...
    18 KB (1,870 words) - 03:36, 6 June 2025
  • Protection Profile (category Computer security procedures)
    that could protect information, evaluated their strength, and mapped security features needed for specific operating environment risks. The results were...
    5 KB (604 words) - 15:51, 7 April 2025
  • Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS, or Micrium OS) is a real-time operating system (RTOS) designed by Jean J. Labrosse in...
    19 KB (2,259 words) - 04:11, 17 May 2025
  • Bharat Operating System Solutions (BOSS GNU/Linux) (lit. 'India Operating System Solutions') is an Indian Linux distribution based on Debian. The latest...
    9 KB (684 words) - 12:15, 8 July 2025
  • Mandatory access control (category Operating system security)
    computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database)...
    23 KB (2,601 words) - 13:55, 24 May 2025
  • detailed security auditing and alarms. Specific versions evaluated at Trusted Computer System Evaluation Criteria Class C2 and, with the SEVMS security enhanced...
    104 KB (9,238 words) - 05:51, 4 August 2025
  • Thumbnail for Oracle Solaris
    Oracle Solaris is a proprietary Unix operating system offered by Oracle for SPARC and x86-64 based workstations and servers. Originally developed by Sun...
    78 KB (6,047 words) - 07:47, 4 August 2025
  • In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software...
    10 KB (1,006 words) - 14:49, 14 July 2025
  • for the CPU to recover without a hard reset, security continues to be enforced, but the operating system cannot properly respond to the failure because...
    15 KB (1,761 words) - 17:55, 19 May 2025
  • Thumbnail for Multics
    time-sharing operating system based on the concept of a single-level memory. It has been written that Multics "has influenced all modern operating systems since...
    40 KB (4,508 words) - 19:41, 24 July 2025