computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are...
12 KB (1,106 words) - 05:47, 16 April 2025
This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved...
4 KB (327 words) - 06:18, 5 May 2025
Secure operating system may refer to: Security-focused operating system Security-evaluated operating system, operating systems that have achieved certification...
459 bytes (83 words) - 15:16, 7 November 2013
Common Criteria Comparison of operating systems Security-evaluated operating system Security-focused operating system List of member of the Common Criteria...
4 KB (395 words) - 06:48, 14 February 2025
Trusted Solaris (category Operating system security)
Trusted Solaris is a discontinued security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model...
5 KB (506 words) - 14:59, 9 May 2025
almost solely on the core kernel. Other operating systems, such as Windows, macOS or Linux, though evaluated at lower levels of assurance, generally include...
5 KB (307 words) - 22:17, 25 January 2025
Solaris Trusted Extensions (category Operating system security)
family of security-evaluated operating systems based on earlier versions of Solaris. Solaris 10 5/09 is Common Criteria certified at Evaluation Assurance...
4 KB (413 words) - 00:02, 11 May 2025
effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered...
18 KB (2,124 words) - 19:40, 25 May 2025
R2, z/OS version 2.1 and z/VM version 6.3. Operating systems that provide multilevel security are evaluated at a minimum of EAL4. Examples with active...
17 KB (1,780 words) - 14:48, 17 May 2025
including operating systems, access control systems, databases, and key management systems. Common Criteria evaluations are performed on computer security products...
30 KB (3,769 words) - 00:01, 9 April 2025
classes of operating systems (special-purpose operating systems), such as embedded and real-time systems, exist for many applications. Security-focused operating...
70 KB (8,176 words) - 14:39, 31 May 2025
user program on a capability-based operating system must use a capability to access an object. Capability-based security refers to the principle of designing...
14 KB (1,668 words) - 22:55, 12 June 2025
Reference monitor (category Operating system security)
the mechanism itself and hence violate the security policy. For example, Windows 3.x and 9x operating systems were not built with a reference monitor, whereas...
4 KB (567 words) - 00:07, 7 July 2023
XTS-400 (redirect from Secure Trusted Operating Program)
x86 hardware and the Secure Trusted Operating Program (STOP) operating system. XTS-400 was developed by BAE Systems, and originally released as version...
17 KB (2,239 words) - 15:01, 19 December 2024
products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified to a high evaluated assurance level:...
31 KB (4,178 words) - 04:23, 8 March 2025
computer operating systems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operating systems. 1951...
70 KB (3,408 words) - 11:01, 5 June 2025
policies, security policies, employee termination policies, system operating procedures and an overview of operating systems. Physical security / environmental...
31 KB (4,033 words) - 11:39, 11 May 2025
Labs into operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. The name of the operating system, many of...
20 KB (1,981 words) - 09:11, 9 May 2025
Protection Profile (category Computer security procedures)
that could protect information, evaluated their strength, and mapped security features needed for specific operating environment risks. The results were...
5 KB (604 words) - 15:51, 7 April 2025
hack being used was a "security evaluation" conducted by the United States Air Force, in which the Multics operating systems were tested for "potential...
18 KB (1,870 words) - 03:36, 6 June 2025
Project for the FreeBSD and Darwin operating systems. Security-Enhanced Linux implements the Flux Advanced Security Kernel (FLASK). Such a kernel contains...
36 KB (3,661 words) - 06:42, 3 April 2025
Bharat Operating System Solutions (BOSS GNU/Linux) is an Indian Linux distribution based on Debian. The latest stable release is 10.0 (Pragya), which was...
9 KB (679 words) - 23:22, 2 June 2025
including lower level mechanisms to bypass the security monitor. Evaluatable: any trusted component can be evaluated to the level of assurance required of that...
6 KB (606 words) - 21:12, 11 June 2025
their systems. One use of the term computer security refers to technology that is used to implement secure operating systems. Using secure operating systems...
220 KB (22,314 words) - 10:38, 16 June 2025
Mandatory access control (category Operating system security)
computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database)...
23 KB (2,601 words) - 13:55, 24 May 2025
Oracle Solaris (redirect from Solaris operating system)
Oracle Solaris is a proprietary Unix operating system offered by Oracle for SPARC and x86-64 based workstations and servers. Originally developed by Sun...
78 KB (6,037 words) - 06:06, 19 June 2025
OpenVMS (redirect from VMS (operating system))
detailed security auditing and alarms. Specific versions evaluated at Trusted Computer System Evaluation Criteria Class C2 and, with the SEVMS security enhanced...
104 KB (9,197 words) - 01:39, 11 June 2025
The Tactical Automated Security System (TASS) is a U.S. Air Force intrusion detection and surveillance system used for security monitoring around fixed...
4 KB (516 words) - 01:23, 7 April 2025
Micro-Controller Operating Systems (MicroC/OS, stylized as μC/OS, or Micrium OS) is a real-time operating system (RTOS) designed by Jean J. Labrosse in...
19 KB (2,259 words) - 04:11, 17 May 2025
for the CPU to recover without a hard reset, security continues to be enforced, but the operating system cannot properly respond to the failure because...
15 KB (1,761 words) - 17:55, 19 May 2025