Graphical Models for Security