Security-evaluated operating system, operating systems that have achieved certification from an external security-auditing organization
Trusted operating system, an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements
Topics referred to by the same term
This disambiguation page lists articles associated with the title Secure operating system. If an internal link led you here, you may wish to change the link to point directly to the intended article.
and 19 Related for: Secure operating system information
Secureoperatingsystem may refer to: Security-focused operatingsystem Security-evaluated operatingsystem, operatingsystems that have achieved certification...
computer operatingsystems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operatingsystems. 1951...
compromises today, one can argue such an operatingsystem is more secure. OpenBSD is a network operatingsystem. Ubuntu is a Linux distribution aimed at...
An operatingsystem (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs...
This is a comparison of mobile operatingsystems. Only the latest versions are shown in the table below, even though older versions may still be marketed...
A secure element (SE) is a secureoperatingsystem (OS) in a tamper-resistant processor chip or secure component. It can protect assets (root of trust...
applications running on the device than a rich operatingsystem (OS) and more functionality than a 'secure element' (SE). The Open Mobile Terminal Platform...
for interaction with the operatingsystem. Examples of firmware that implement the specification are AMI Aptio, Phoenix SecureCore, TianoCore EDK II, InsydeH2O...
There are a number of Unix-like operatingsystems based on or descended from the Berkeley Software Distribution (BSD) series of Unix variant options....
University of Utah, and the Secure Computing Corporation project designed to provide a framework for a more secureoperatingsystem. Development and implementation...
conference, Google declared that ChromeOS would be the most secure consumer operatingsystem due in part to a verified boot ability, in which the initial...
A mobile operatingsystem is an operatingsystem used for smartphones, tablets, smartwatches, smartglasses, or other non-laptop personal mobile computing...
Just enough operatingsystem (JeOS, pronounced "juice" according to SUSE) is a paradigm for customizing operatingsystems to fit the needs of a particular...
Trusted OperatingSystem (TOS) generally refers to an operatingsystem that provides sufficient support for multilevel security and evidence of correctness...
fork. Qubes OS – Security-focused desktop operatingsystem Whonix – Debian-based security distribution SecureDrop and GlobaLeaks software is used in most...
time-sharing operatingsystem based on the concept of a single-level memory. Nathan Gregory writes that Multics "has influenced all modern operatingsystems since...
privilege, applied throughout the operatingsystem including the Xenocara X server. OpenSSH includes the ability to set up a secured channel through which data...
to implement a variety of types of operatingsystems (OS), though mostly for Unix-like, Portable OperatingSystem Interface (POSIX) compliant types. L4...