Security-evaluated operating system

Results: 18



#Item
11Protection Profile / Evaluation Assurance Level / Security Target / National Information Assurance Partnership / ITSEC / Windows / Vulnerability / Security-evaluated operating system / Multilevel security / Computer security / Evaluation / Common Criteria

Understanding common criteria evaluation - technical note 02/03

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2011-01-25 08:00:05
12Computing / Mac OS X / Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / National Information Assurance Partnership / Labeled Security Protection Profile / Security-evaluated operating system / Computer security / Evaluation / Computer architecture

Common Criteria Certification: Appleʼs Ongoing Commitment to Security Introduction Apple has always been committed to providing the safest, most user-centered computing experience possible. Mac OS X is built on a rock-s

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2009-12-22 15:28:05
13Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / Integrated circuit / Cryptographic Module Testing Laboratory / Security-evaluated operating system / Evaluation / Computer security / Security

Supporting Document Mandatory Technical Document The Application of CC to Integrated Circuits March 2009

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:55:15
14Common Criteria / Security Target / Java Card / Java / Protection Profile / Security-evaluated operating system / Computing / Evaluation / Computer security

Supporting Document Mandatory Technical Document Composite product evaluation for Smart Cards and similar devices April 2012

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-04-03 20:01:22
15Common Criteria / Security Target / Evaluation Assurance Level / Protection Profile / Labeled Security Protection Profile / Security-evaluated operating system / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements August 2005

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:06
16Computer architecture / Unix / Mach / Tru64 UNIX / Su / Unix security / AdvFS / Operating system / Berkeley Software Distribution / System software / System administration / Software

Tru64 UNIX Evaluated Configuration May[removed]Product Version:

Add to Reading List

Source URL: www.tru64unix.compaq.com

Language: English - Date: 2003-04-01 06:20:52
17Common Criteria / ITSEC / Security Target / Protection Profile / Federal Office for Information Security / Evaluation Assurance Level / BSI / Professional certification / Security-evaluated operating system / Computer security / Evaluation / Security

Certification Report BSI-DSZ-CC[removed]

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-10-17 02:02:15
18Evaluation Assurance Level / Security Target / Protection Profile / Penetration test / ITSEC / Software development process / Cimcor / Security-evaluated operating system / Computer security / Evaluation / Common Criteria

PDF Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-01-06 13:44:56
UPDATE