Fig. 2
From: Abstract security patterns and the design of secure systems

Sequence diagram for the use case “authenticate a subject”
From: Abstract security patterns and the design of secure systems
Sequence diagram for the use case “authenticate a subject”