Fig. 1From: Abstract security patterns and the design of secure systemsClass diagram of the abstract authenticator patternBack to article page