Fig. 2From: Abstract security patterns and the design of secure systemsSequence diagram for the use case “authenticate a subject”Back to article page