Overlapping control structures and security in large scale systems

1980
19
214–218