Fig. 4From: Abstract security patterns and the design of secure systemsPattern diagram for an authentication hierarchyBack to article page