Towards A Unified Modeling and Verification of Network and System Security Configuration

   Abstract