Return to Article Details Vulnerability management using a formalized description Download Download PDF