Fig. 3From: Abstract security patterns and the design of secure systemsClass diagram of the credential-based authenticator patternBack to article page