Content deleted Content added
Link to OpenVMS |
m Remove blank line(s) between list items per WP:LISTGAP to fix an accessibility issue for users of screen readers. Do WP:GENFIXES and cleanup if needed. Discuss this at Wikipedia talk:WikiProject Accessibility#LISTGAP |
||
Line 25:
* [[Windows 2008]] Server (64-bit), Enterprise (64-bit) and Datacenter, as well as Windows Vista Enterprise (both 32-bit and 64-bit) attained EAL 4 Augmented (colloquially referred to as EAL 4+) ALC_FLR.3 status in [http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf 2009].
* [[Windows 2000]] Server, Advanced Server, and Professional, each with Service Pack 3 and Q326886 Hotfix operating on the x86 platform were certified as [http://niap.nist.gov/cc-scheme/st/ST_VID4002-VR.pdf CAPP/EAL 4 Augmented ALC_FLR.3] in October 2002. (This includes standard configurations as Domain Controller, Server in a Domain, Stand-alone Server, Workstation in a Domain, Stand-alone Workstation)
* [[Windows XP]] Professional and Embedded editions, with Service Pack 2, and [[Windows Server 2003]] Standard and Enterprise editions (32-bit and 64-bit), with Service Pack 1, were all [http://www.microsoft.com/presspass/press/2005/dec05/12-14CommonCriteriaPR.mspx certified] in December 2005.
Line 51 ⟶ 49:
== Unisys MCP ==
The [[Burroughs MCP|Unisys MCP]] operating system includes an implementation of the DoD [[Trusted Computer System Evaluation Criteria|Orange Book]] [[Trusted Computer System Evaluation Criteria#
== Unisys OS 2200 ==
The [[OS 2200|Unisys OS 2200]] operating system includes an implementation of the DoD [[Trusted Computer System Evaluation Criteria|Orange Book]] [[Trusted Computer System Evaluation Criteria#B .E2.80.94 Mandatory protection|B1, Labeled security protection]] level specification.<ref name="orangebook">{{cite book|publisher=National Security Institute|year=1985|title=Department of Defense Trusted Computer System Evaluation Criteria (NSI 5200.28-STD)|url=http://nsi.org/Library/Compsec/orangebo.txt}}</ref> OS 2200 first obtained a successful B1 evaluation in September, 1989.<ref>{{cite book|publisher= National Computer Security Center|
Unisys maintained that evaluation until 1994 through the National Computer Security Center Rating Maintenance Phase (RAMP) of the Trusted Product Evaluation Program.<ref>{{cite book|publisher= National Computer Security Center|
== See also ==
|