Page 265
The University of SydneyPage 12
Models for Specification of Information Systems SecurityWeek 4