Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.
The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control (MAC). The Common Criteria is the result of a multi-year effort by the governments of the U.S., Canada, United Kingdom, France, Germany, the Netherlands and other countries[1] to develop a harmonized security criteria for IT products.
^List of member of the Common Criteria Recognition Arrangement: http://www.commoncriteriaportal.org/ccra/members/
and 20 Related for: Trusted operating system information
4+) Trusted Solaris Trusted UNICOS 8.0 (Rated B1) XTS-400 (Rated EAL5+) IBM VM (SP, BSE, HPO, XA, ESA, etc.) with RACF Examples of operatingsystems that...
and its operatingsystem. Assuring that an authentic operatingsystem starts in a trusted environment, which can then be considered trusted. Provision...
certification from an external security-auditing organization Trustedoperatingsystem, an operatingsystem that provides sufficient support for multilevel security...
computer operatingsystems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operatingsystems. 1951...
Watch watchOS Apple TV tvOS Embedded operatingsystems bridgeOS Apple Vision Pro visionOS Embedded operatingsystems A/ROSE iPod software (unnamed embedded...
computer stos, an opcode mnemonic in X86 assembly language Secure TrustedOperatingSystem Consortium Štós, a village in Slovakia ST:TOS, an abbreviation...
from a trustedsystem. The dedication of significant system engineering toward minimizing the complexity (not size, as often cited) of the trusted computing...
a system we must trust. This distinction is important because systems that need to be trusted are not necessarily trustworthy. An MLS operating environment...
they operate at the same security level as the operatingsystem itself, and are thus able to intercept or subvert the most trustedoperatingsystem operations...
computer) operatingsystems. The article "Usage share of operatingsystems" provides a broader, and more general, comparison of operatingsystems that includes...
Trusted Solaris is a discontinued security-evaluated operatingsystem based on Solaris by Sun Microsystems, featuring a mandatory access control model...
process starts from a trusted combination of hardware and software), and to store disk encryption keys. One of Windows 11's operatingsystem requirements is...
feasible. The term trusted computing base goes back to John Rushby, who defined it as the combination of operatingsystem kernel and trusted processes. The...
A distributed operatingsystem is system software over a collection of independent software, networked, communicating, and physically separate computational...
Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for...
that ChromeOS netbooks would be shipped with Trusted Platform Module (TPM), and include both a "trusted boot path" and a physical switch under the battery...
to the Xenix system. Trusted Xenix was a variant initially developed by IBM, under the name Secure XENIX; later versions, under the Trusted Xenix name,...
Solaris is a proprietary Unix operatingsystem originally developed by Sun Microsystems. After the Sun acquisition by Oracle in 2010, it was renamed Oracle...
The version history of the Android mobile operatingsystem began with the public release of its first beta on November 5, 2007. The first commercial version...
iOS (formerly iPhone OS) is a mobile operatingsystem developed by Apple Inc. exclusively for its smartphones. It was unveiled in January 2007 for the...