Security-evaluated operating system

Results: 18



#Item
1Protection Profile / Security Target / United Kingdom Accreditation Service / Cryptographic Module Testing Laboratory / Security-evaluated operating system / Evaluation / Computer security / Common Criteria

Steven J. Murdoch University of Cambridge Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-25 06:54:24
2Evaluation / National Security Agency / Computer network security / Common Criteria / Secure Shell / OpenSSH / Operating system / System administrator / Security-Enhanced Linux / Computer security / Computing / System software

EAL3 Evaluated Configuration Guide for Red Hat Enterprise Linux Klaus Weidner <> June 29, 2004; v1.2 atsec is a trademark of atsec GmbH

Add to Reading List

Source URL: ltp.sourceforge.net

Language: English - Date: 2006-08-02 13:13:54
3Common Criteria / Ethics / Thought / Public key certificate / Security-evaluated operating system / Evaluation / Computer security / Evaluation Assurance Level

JIL-Assurance-Package-declaration-in-certificate-V1.0

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-06-04 10:45:57
4Common Criteria / Enterprise application integration / Web services / National security / Computing / Service-oriented architecture / Security-evaluated operating system / Evaluation / Security / Computer security

TRA Process for Information Technologies of Information Systems

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:46
5Security Target / Evaluation Assurance Level / Protection Profile / Common Criteria / Quality assurance / Security-evaluated operating system / Evaluation / Computer security / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-027 CR Certification Report Issue[removed]December[removed]Toshiba T6ND5 HW version 5

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:34
6Evaluation Assurance Level / Common Criteria / Security Target / Protection Profile / Security-evaluated operating system / Evaluation / Computer security / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-014 CR Certification Report Issue[removed]March[removed]Fort Fox Hardware Data Diode FFHDD2

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:31
7Protection Profile / Security Target / Evaluation Assurance Level / Penetration test / Labeled Security Protection Profile / Security-evaluated operating system / Computer security / Evaluation / Common Criteria

Common Criteria FAQ What is the Common Criteria? The Common Criteria (CC) is an international standard (ISO/IEC[removed]for evaluating the security properties of IT products and systems. It defines a framework for the ove

Add to Reading List

Source URL: www.ccusersforum.org

Language: English - Date: 2014-09-30 14:58:08
8Software / Common Criteria / Protection Profile / Security Target / National Information Assurance Partnership / Evaluation Assurance Level / Mac OS X / Operating system / Security-evaluated operating system / Computer security / Evaluation / Computer architecture

Common Criteria Certification: Apple’s Ongoing Commitment to Security Introduction Apple has always been committed to providing the safest, most user-centered computing experience possible. Mac OS X is built on a rock-

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2007-06-05 20:38:44
9Common Criteria / Protection Profile / Evaluation Assurance Level / Identity assurance / Security-evaluated operating system / Safelayer Secure Communications / Computer security / Evaluation / Security

POSITION PAPER DIGITAL IDENTITY SECURITY: SOGIS-MRA AS A COMMON FRAMEWORK TOWARDS DIGITAL TRUST SUMMARY AND RECOMMENDATIONS: The concept of digital identity is tightly linked to personal data protection and privacy prote

Add to Reading List

Source URL: eurosmart.com

Language: English - Date: 2014-07-11 09:04:03
10Common Criteria / Evaluation Assurance Level / Security Target / FIPS 140-2 / Windows / Protection Profile / Security-evaluated operating system / Evaluation / Computer security / Security

Microsoft Word - CR for WinMagic SecureDoc v1.0.doc

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
UPDATE