Article Figure 1 Figure 2 dec98.tar

Figure 1: Security infrastructure model