Fig. 11From: Abstract security patterns and the design of secure systemsEntity security servicesBack to article page