nt-part2_77
Analysis of the Security of Windows NT
1 March 1999
77
France, pp. 515-540, Sept. 1993.
[63] Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst and Bev Littlewood,
Towards Operational Measures of Computer Security: Experimentation and Mod-
elling, in B. Randell et al. (editors): Predictably Dependable Computing Systems,
Springer Verlag, 1995. pp. 555-572.
[64] Tom Sheldon, Windows NT Security Handbook. McGraw-Hill, 1997.
[65] Trusted Computer System Evaluation Criteria (orange book). National Com-
puter Security Center, Department of Defense, No DOD 5200.28.STD, 1985.
[66] U. Lindqvist and E. Jonsson. A classification of computer security intrusions:
Means and ends. In NORDSEC96 Nordic Workshop on Secure Computer Sys-
tems, Goteborg, Sweden, November 78, 1996.
[67] Ulf Gustafsson, Erland Jonsson and Tomas Olovsson, Security Evaluation of a PC
Network Based on Intrusion Experiments. Proceedings of the 14th International
Congress on Computer and Communications Security, SECURICOM 96, Paris,
France, pp. 187-203, June 4-6, 1996.
[68] Ulf Lindqvist, Thomas Olovsson and Erland Jonsson, An analysis of a secure sys-
tem based on trusted components. In Proceedings of the Eleventh Annual Confer-
ence on Computer Assurance (COMPASS 96), pp. 213223, Gaithersburg,
Maryland, USA, June 1721, 1996.
[69] Wietse Venema [et al], Improving the Security of Your Site by Breaking Into It,
1992.
[70] William Stallings, Operating Systems, 2nd Edition. Prentice Hall, 1995.