Concerning 'modeling' of computer security | IEEE Conference Publication | IEEE Xplore