Fig. 5From: Abstract security patterns and the design of secure systemsClass model of the X.509-based authenticatorBack to article page