Statements (25)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:operating_system
|
gptkbp:based_on |
gptkb:AIX
|
gptkbp:developed_by |
gptkb:IBM
|
gptkbp:enhances |
system integrity
|
gptkbp:features |
mandatory access control
|
https://www.w3.org/2000/01/rdf-schema#label |
Trusted AIX
|
gptkbp:includes |
Trusted Computing Base
|
gptkbp:is_available_on |
gptkb:IBM_Power_Architecture
|
gptkbp:is_compatible_with |
gptkb:IBM
gptkb:POSIX_standards |
gptkbp:is_designed_for |
high-security applications
|
gptkbp:is_known_for |
robust security measures
|
gptkbp:is_part_of |
IBM AIX family
|
gptkbp:is_used_by |
government agencies
|
gptkbp:offers |
audit capabilities
|
gptkbp:provides |
gptkb:security_services
data encryption |
gptkbp:released |
gptkb:1997
|
gptkbp:supports |
security features
multi-user access virtualization technologies |
gptkbp:used_in |
enterprise environments
|
gptkbp:utilizes |
gptkb:Identity_and_Access_Management
|
gptkbp:bfsParent |
gptkb:AIX
|
gptkbp:bfsLayer |
4
|