This paper describes the methodological results of a research project involving the security characteristics of a large-scale computer operating system. The research involved an in-depth analysis of a complex subsystem, and the preparation of diagra...