For example, there is nothing inherently incorrect about … wishes that we perceive a security violation. It … of the system's expected behaviour. … It is impossible to even describe security without …
Google-1
Google-2
Copyright clearance needed for quotation.