Return to Article Details Architecture for detecting violations of security policies using the ABD method Download Download PDF