Return to Article Details MODELING THE SECURITY POLICY OF THE INFORMATION SYSTEM FOR CRITICAL USE Download Download PDF