Fig. 8From: Abstract security patterns and the design of secure systemsFrom SSFs to ASPsBack to article page