I think its worth linking to other methods of modeling security or simply definining them all on a single pageBah23 17:20, 12 March 2007 (UTC)