HostedDB - Dedicated UNIX Servers

nt-part2_77 Analysis of the Security of  Windows NT 1 March 1999 77 France, pp. 515-540, Sept. 1993. [63]   Tomas   Olovsson,   Erland   Jonsson,   Sarah   Brocklehurst   and   Bev   Littlewood, Towards Operational Measures of Computer Security: Experimentation and Mod- elling, in B. Randell et al. (editors): Predictably Dependable Computing Systems, Springer Verlag, 1995. pp. 555-572. [64] Tom Sheldon, Windows NT Security Handbook. McGraw-Hill, 1997. [65] Trusted Computer System Evaluation Criteria (“orange book”). National Com- puter Security Center, Department of Defense, No DOD 5200.28.STD, 1985. [66] U. Lindqvist and E. Jonsson. “A classification of computer security intrusions: Means and ends.” In NORDSEC’96 – Nordic Workshop on Secure Computer Sys- tems, Goteborg, Sweden, November 7–8, 1996. [67] Ulf Gustafsson, Erland Jonsson and Tomas Olovsson, Security Evaluation of a PC Network Based on Intrusion Experiments. Proceedings of the 14th International Congress on Computer and Communications Security, SECURICOM ‘96, Paris, France, pp. 187-203, June 4-6, 1996. [68] Ulf Lindqvist, Thomas Olovsson and Erland Jonsson, An analysis of a secure sys- tem based on trusted components.” In Proceedings of the Eleventh Annual Confer- ence   on   Computer   Assurance   (COMPASS ’96),   pp.   213–223,   Gaithersburg, Maryland, USA, June 17–21, 1996. [69] Wietse Venema [et al], Improving the Security of Your Site by Breaking Into It, 1992. [70] William Stallings, Operating Systems, 2nd Edition. Prentice Hall, 1995.