Fig. 9From: Abstract security patterns and the design of secure systemsCombining SSFsBack to article page