As a result of studies of the security characteristics of selected large operating systems, it has become increasingly evident that any complex operating system requires testing and evaluation in order to validate the functional characteristics of the...