I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
,
p
p
.
2911
~
2
9
2
7
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/ijece.
v
15
i
3
.
pp
2
9
1
1
-
2
9
2
7
2911
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
A comp
a
riso
n of
a
ppro
a
ches for m
o
deling
so
ft
wa
re s
ecurity
requireme
nts usi
ng
unif
ied
mo
deli
ng
lang
ua
g
e ex
ten
sio
ns
Sy
ed
M
u
ha
m
m
a
d J
un
a
id H
a
s
s
a
n
1
,
Aa
m
ir
Sh
a
ha
b
2
,
F
a
t
im
a
Ali Ta
bb
a
3
,
M
ua
t
h Alr
a
m
m
a
l
4
,
F
a
di Abu
-
Am
a
ra
5
,
M
uh
a
m
m
a
d Na
deem
6
1
D
e
p
a
r
t
me
n
t
o
f
I
n
f
o
r
mat
i
o
n
Te
c
h
n
o
l
o
g
y
,
B
a
l
o
c
h
i
st
a
n
U
n
i
v
e
r
si
t
y
o
f
I
n
f
o
r
ma
t
i
o
n
Te
c
h
n
o
l
o
g
y
,
E
n
g
i
n
e
e
r
i
n
g
a
n
d
M
a
n
a
g
e
m
e
n
t
S
c
i
e
n
c
e
s,
B
a
l
o
c
h
i
st
a
n
,
P
a
k
i
s
t
a
n
2
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
En
g
i
n
e
e
r
i
n
g
,
B
a
l
o
c
h
i
st
a
n
U
n
i
v
e
r
si
t
y
o
f
I
n
f
o
r
mat
i
o
n
Te
c
h
n
o
l
o
g
y
,
E
n
g
i
n
e
e
r
i
n
g
a
n
d
M
a
n
a
g
e
me
n
t
S
c
i
e
n
c
e
s
,
B
a
l
o
c
h
i
st
a
n
,
P
a
k
i
s
t
a
n
3
S
c
h
o
o
l
o
f
C
o
m
p
u
t
i
n
g
a
n
d
I
n
f
o
r
m
a
t
i
o
n
S
c
i
e
n
c
e
s,
S
o
h
a
i
l
U
n
i
v
e
r
s
i
t
y
,
S
i
n
d
h
,
P
a
k
i
st
a
n
4
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
a
n
d
I
n
f
o
r
m
a
t
i
o
n
S
c
i
e
n
c
e
,
H
i
g
h
e
r
C
o
l
l
e
g
e
s
o
f
Te
c
h
n
o
l
o
g
y
,
A
b
u
D
h
a
b
i
,
U
n
i
t
e
d
A
r
a
b
Em
i
r
a
t
e
s
5
D
i
v
i
si
o
n
o
f
A
p
p
l
i
e
d
S
c
i
e
n
c
e
s,
C
y
b
e
r
sec
u
r
i
t
y
P
r
o
g
r
a
m,
S
h
e
n
a
n
d
o
a
h
U
n
i
v
e
r
si
t
y
,
W
i
n
c
h
e
s
t
e
r
,
V
i
r
g
i
n
i
a
,
U
n
i
t
e
d
S
t
a
t
e
s
o
f
A
mer
i
c
a
6
C
o
m
p
u
t
e
r
I
n
f
o
r
ma
t
i
o
n
S
c
i
e
n
c
e
D
e
p
a
r
t
men
t
,
H
i
g
h
e
r
C
o
l
l
e
g
e
s o
f
Te
c
h
n
o
l
o
g
y
,
A
b
u
D
h
a
b
i
,
U
n
i
t
e
d
A
r
a
b
Emi
r
a
t
e
s
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
l 1
3
,
2
0
2
4
R
ev
is
ed
Ma
r
5
,
2
0
2
5
Acc
ep
ted
Ma
r
2
0
,
2
0
2
5
Th
e
u
n
ifi
e
d
m
o
d
e
li
n
g
la
n
g
u
a
g
e
(UML
)
s
u
p
p
o
rts
e
x
ten
si
o
n
m
e
c
h
a
n
ism
s
c
a
ll
e
d
ste
re
o
ty
p
e
s,
tag
g
e
d
v
a
lu
e
s,
a
n
d
c
o
n
stra
i
n
ts
to
e
x
te
n
d
it
s
m
o
d
e
li
n
g
c
a
p
a
b
il
it
ies
.
T
h
e
se
e
x
ten
sio
n
m
e
c
h
a
n
ism
s
a
re
u
ti
li
z
e
d
to
c
re
a
te
n
e
w
a
n
d
c
u
sto
m
ize
d
p
r
o
fil
e
s.
Th
e
ir
a
p
p
li
c
a
ti
o
n
s
i
n
m
o
d
e
li
n
g
e
m
e
rg
in
g
se
c
u
rit
y
re
q
u
irem
e
n
ts
a
re
d
isc
u
ss
e
d
.
To
m
o
d
e
l
a
u
th
e
n
ti
c
a
ti
o
n
,
a
v
a
il
a
b
il
i
ty
,
in
teg
rit
y
,
a
c
c
e
s
s
c
o
n
tro
l,
c
o
n
fid
e
n
ti
a
li
ty
,
d
a
ta
in
teg
rit
y
,
n
o
n
-
re
p
u
d
iati
o
n
,
a
u
th
o
riza
ti
o
n
,
e
n
c
ry
p
ti
o
n
,
h
a
sh
i
n
g
,
a
n
d
se
ss
io
n
m
e
c
h
a
n
ism
s,
a
se
t
o
f
n
o
v
e
l
ste
r
e
o
ty
p
e
s
i
s
p
ro
p
o
se
d
in
th
is
p
a
p
e
r.
T
h
e
p
r
o
p
o
se
d
ste
re
o
t
y
p
e
s
i
n
h
e
rit
fro
m
b
a
se
li
n
e
se
c
u
rit
y
re
q
u
irem
e
n
ts.
F
u
rth
e
r,
s
e
c
u
rit
y
c
o
n
c
e
p
ts
wit
h
in
t
h
e
UML
d
iag
ra
m
a
re
re
p
re
se
n
ted
u
sin
g
t
h
e
se
ste
re
o
ty
p
e
s
a
n
d
se
c
u
rit
y
n
o
tati
o
n
s.
In
a
d
d
it
i
o
n
,
th
e
p
r
o
p
o
se
d
ste
re
o
t
y
p
e
s
we
re
e
v
a
lu
a
ted
wit
h
th
e
h
e
lp
o
f
h
u
m
a
n
su
b
jec
t
e
v
a
lu
a
ti
o
n
u
sin
g
re
a
l
-
wo
rld
sc
e
n
a
rio
s
t
o
i
ll
u
stra
te
th
e
u
se
fu
l
n
e
ss
o
f
t
h
e
se
ste
re
o
ty
p
e
s
in
m
o
d
e
ll
in
g
se
c
u
rit
y
re
q
u
irem
e
n
ts.
Th
is
p
a
p
e
r
c
o
n
tri
b
u
tes
a
ste
re
o
ty
p
e
d
m
o
d
e
l
f
o
r
se
c
u
rit
y
r
e
q
u
irem
e
n
ts
with
se
c
u
ri
ty
s
y
m
b
o
ls
a
n
d
a
li
b
ra
ry
o
f
h
i
g
h
-
q
u
a
l
it
y
se
c
u
rit
y
n
o
tatio
n
s,
w
h
ich
c
a
n
b
e
i
n
teg
ra
ted
in
t
o
e
x
isti
n
g
o
r
n
e
w
d
iag
ra
m
s
to
e
n
h
a
n
c
e
se
c
u
rit
y
re
q
u
irem
e
n
ts
m
o
d
e
li
n
g
.
Re
su
lt
s
in
d
ica
te
t
h
a
t
t
h
e
p
ro
p
o
se
d
ste
r
e
o
ty
p
e
d
m
o
d
e
l
imp
r
o
v
e
s
th
e
m
o
d
e
li
n
g
p
ro
c
e
ss
o
f
se
c
u
rit
y
re
q
u
irem
e
n
ts.
It
a
lso
p
r
o
v
id
e
s
a
b
e
tt
e
r
re
p
re
se
n
tatio
n
o
f
e
m
e
rg
in
g
se
c
u
rit
y
m
e
c
h
a
n
ism
s
in
so
ftwa
re
d
e
sig
n
.
F
in
a
ll
y
,
d
u
ri
n
g
t
h
e
so
ftwa
re
d
e
v
e
lo
p
m
e
n
t
p
r
o
c
e
ss
,
sta
k
e
h
o
l
d
e
rs
e
n
jo
y
imp
ro
v
e
d
c
o
m
m
u
n
ica
ti
o
n
a
n
d
u
n
d
e
rsta
n
d
i
n
g
o
f
se
c
u
rit
y
re
q
u
irem
e
n
ts.
K
ey
w
o
r
d
s
:
So
f
twar
e
s
ec
u
r
ity
r
eq
u
ir
em
en
t
s
Secu
r
ity
n
o
tatio
n
s
Secu
r
ity
s
y
m
b
o
ls
UM
L
Ster
eo
ty
p
e
UM
L
Sec
Un
if
ied
m
o
d
elin
g
lan
g
u
ag
e
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Aam
ir
Sh
ah
ab
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
E
n
g
i
n
ee
r
in
g
,
B
alo
ch
is
tan
Un
iv
e
r
s
ity
o
f
I
n
f
o
r
m
atio
n
T
ec
h
n
o
l
o
g
y
,
E
n
g
in
ee
r
in
g
an
d
Ma
n
ag
em
en
t Scie
n
ce
s
B
alo
ch
is
tan
,
Pak
is
tan
E
m
ail:
aa
m
ir
@
ieee
.
o
r
g
1.
I
NT
RO
D
UCT
I
O
N
U
M
L
s
t
e
r
e
o
t
y
p
e
s
h
a
v
e
b
e
e
n
u
s
e
d
t
o
m
o
d
e
l
t
h
e
d
i
f
f
e
r
e
n
t
t
y
p
e
s
o
f
s
ec
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
ts
.
E
x
a
m
p
l
e
s
o
f
s
e
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
s
i
n
c
l
u
d
e
a
u
t
h
e
n
t
i
ci
t
y
,
s
e
c
r
e
c
y
,
i
n
t
e
g
r
it
y
,
s
e
c
u
r
e
c
o
m
m
u
n
i
c
a
t
i
o
n
,
f
ai
r
e
x
c
h
a
n
g
e
,
n
o
n
-
r
e
p
u
d
i
a
t
i
o
n
,
f
r
e
s
h
n
e
s
s
,
g
u
a
r
d
e
d
a
c
c
e
s
s
,
s
e
c
u
r
e
i
n
f
o
r
m
a
t
i
o
n
f
lo
w
,
a
n
d
r
o
l
e
-
b
a
s
e
d
a
c
c
e
s
s
c
o
n
t
r
o
l
.
S
i
n
c
e
t
h
r
e
at
s
to
c
o
m
p
u
t
i
n
g
s
y
s
t
e
m
s
a
r
e
i
n
c
r
e
as
i
n
g
d
a
y
b
y
d
a
y
,
s
e
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
s
a
r
e
al
s
o
c
h
a
n
g
i
n
g
ac
c
o
r
d
i
n
g
l
y
.
T
o
m
e
e
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
2
9
1
1
-
2
9
2
7
2912
t
h
e
s
e
s
e
c
u
r
it
y
r
e
q
u
i
r
e
m
e
n
ts
,
n
ew
m
e
c
h
a
n
is
m
s
a
n
d
t
e
c
h
n
o
l
o
g
ie
s
h
a
v
e
b
e
e
n
i
n
t
r
o
d
u
c
e
d
[
1
]
.
He
n
c
e
,
t
h
e
r
e
is
a
n
e
e
d
t
o
d
e
f
i
n
e
n
e
w
s
t
e
r
e
o
t
y
p
es
a
n
d
/
o
r
o
t
h
e
r
U
M
L
e
x
t
e
n
s
i
o
n
s
t
h
at
h
e
l
p
s
o
f
t
w
a
r
e
d
e
s
i
g
n
e
r
s
t
o
d
e
s
i
g
n
s
o
f
t
wa
r
e
i
n
a
m
o
r
e
m
e
a
n
i
n
g
f
u
l
a
n
d
s
m
a
r
t
w
a
y
.
I
n
t
h
i
s
p
a
p
e
r
,
w
e
d
i
s
c
u
s
s
r
is
k
-
b
a
s
e
d
a
u
t
h
e
n
t
i
c
at
i
o
n
,
m
u
l
t
i
-
f
ac
t
o
r
a
u
t
h
e
n
t
i
c
a
ti
o
n
,
t
w
o
-
f
a
c
t
o
r
a
u
t
h
e
n
t
i
c
at
i
o
n
m
e
ch
a
n
i
s
m
s
,
a
n
d
o
t
h
e
r
s
e
c
u
r
i
t
y
r
eq
u
i
r
e
m
e
n
t
s
w
h
i
c
h
a
r
e
e
x
p
l
a
i
n
e
d
i
n
s
e
c
t
i
o
n
2
,
a
n
d
p
r
o
p
o
s
e
s
e
c
u
r
i
t
y
s
y
m
b
o
l
s
t
o
m
o
d
e
l
s
e
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
s
r
el
at
e
d
t
o
t
h
e
m
.
T
wo
-
f
ac
to
r
au
th
e
n
ticatio
n
(
T
FA)
is
a
ty
p
e
o
f
m
u
lti
-
f
ac
to
r
au
t
h
en
ticatio
n
th
at
r
e
q
u
ir
es
th
e
p
r
esen
tatio
n
o
f
two
o
r
m
o
r
e
au
th
en
ticatio
n
f
ac
to
r
s
[
2
]
.
T
h
ese
f
ac
to
r
s
u
s
u
ally
in
clu
d
e
s
o
m
eth
in
g
th
e
u
s
er
k
n
o
ws
(
e.
g
.
p
ass
wo
r
d
o
r
PIN
)
,
s
o
m
eth
in
g
th
e
u
s
er
h
as
(
e.
g
.
,
a
cr
ed
it
ca
r
d
o
r
a
s
m
ar
t
ca
r
d
)
,
an
d
/o
r
s
o
m
eth
in
g
th
e
u
s
er
is
(
e.
g
.
,
a
th
u
m
b
im
p
r
ess
io
n
o
r
an
y
o
th
er
b
io
m
etr
ic
f
ea
tu
r
e)
.
R
is
k
b
ased
au
th
en
ticatio
n
is
a
d
y
n
am
ic
au
th
e
n
ticatio
n
m
e
ch
an
is
m
th
at
u
s
es
th
e
ag
en
t
p
r
o
f
ile
th
at
r
eq
u
ests
ac
ce
s
s
to
th
e
s
y
s
tem
to
d
eter
m
in
e
th
e
r
is
k
p
r
o
f
ile
ass
o
ciate
d
with
th
at
tr
an
s
ac
tio
n
.
T
h
e
r
is
k
p
r
o
f
ile
is
th
en
u
s
ed
to
f
in
d
th
e
au
th
e
n
ticatio
n
tech
n
iq
u
e
o
r
i
n
tr
icac
y
o
f
th
e
ch
allen
g
e
to
b
e
u
s
ed
.
Hig
h
er
-
r
is
k
p
r
o
f
iles
lead
to
s
tr
o
n
g
e
r
ch
alle
n
g
es,
w
h
er
ea
s
s
im
p
le
u
s
er
n
am
e/p
ass
wo
r
d
a
u
th
en
ticatio
n
m
ay
b
e
c
o
n
s
id
er
ed
s
u
f
f
icien
t
f
o
r
lo
wer
-
r
is
k
p
r
o
f
iles
.
Ma
n
y
s
o
f
twar
e
d
ev
elo
p
e
r
s
lack
awa
r
en
ess
an
d
s
u
f
f
icien
t
tr
ain
in
g
in
s
ec
u
r
ity
.
I
n
a
d
d
itio
n
,
m
an
y
p
r
o
g
r
a
m
m
in
g
b
o
o
k
s
d
o
n
o
t
te
ac
h
h
o
w
t
o
wr
ite
s
ec
u
r
e
p
r
o
g
r
am
s
[
3
]
.
R
esear
ch
in
th
is
d
o
m
ain
h
as
led
t
o
th
e
cr
ea
tio
n
o
f
to
o
ls
an
d
p
r
o
to
t
y
p
es,
th
o
u
g
h
o
n
ly
a
lim
ited
n
u
m
b
er
o
f
th
em
ar
e
ac
ce
s
s
ib
le
to
th
e
p
u
b
lic.
Fu
r
th
er
m
o
r
e
,
th
e
s
u
g
g
ested
n
o
tatio
n
s
h
av
e
u
n
d
er
g
o
n
e
d
i
v
e
r
s
e
ev
alu
atio
n
s
,
in
clu
d
in
g
ca
s
e
s
tu
d
ies,
s
ce
n
ar
io
s
,
an
d
u
s
er
ex
p
er
im
en
ts
,
to
s
h
o
wca
s
e
th
eir
ef
f
icac
y
.
T
h
e
r
est
o
f
th
is
p
ap
er
is
o
r
g
an
ize
d
as
f
o
llo
ws.
Sectio
n
2
d
is
cu
s
s
es
th
e
p
r
o
p
o
s
ed
ap
p
r
o
a
ch
;
s
ec
tio
n
3
d
is
cu
s
s
es
th
e
liter
atu
r
e
r
e
v
iew;
s
ec
tio
n
4
d
is
cu
s
s
es
th
e
r
esu
lts
;
an
d
s
ec
tio
n
5
p
r
o
v
id
es th
e
co
n
clu
s
io
n
s
.
2.
RE
L
AT
E
D
WO
RK
R
esear
ch
er
s
h
av
e
s
u
g
g
ested
d
iv
er
s
e
m
o
d
elin
g
n
o
tatio
n
s
to
d
ep
ict
s
ec
u
r
ity
r
eq
u
ir
e
m
en
ts
;
h
o
wev
e
r
,
th
ese
n
o
tatio
n
s
h
av
e
n
o
t
b
ee
n
in
teg
r
ated
in
to
wid
ely
u
s
ed
s
o
f
twar
e
m
o
d
elin
g
to
o
ls
,
an
d
th
e
ir
ef
f
icac
y
r
em
ain
s
u
n
ass
ess
ed
.
A
d
ee
p
lear
n
in
g
m
o
d
el
was
d
ev
elo
p
e
d
to
p
r
o
te
ct
u
s
er
s
f
r
o
m
p
h
is
h
in
g
attac
k
s
b
y
cr
ea
tin
g
a
s
m
ar
t
war
n
in
g
s
y
s
tem
,
ac
h
iev
in
g
a
h
ig
h
ac
cu
r
ac
y
o
f
9
8
.
4
%.
A
m
u
ltis
ca
le
ap
p
r
o
ac
h
u
s
in
g
a
Py
th
o
n
-
b
ased
s
ca
n
n
er
was
p
r
esen
ted
f
o
r
th
e
d
etec
t
io
n
an
d
m
itig
atio
n
o
f
web
-
b
ased
ap
p
licatio
n
s
.
L
ac
k
o
f
s
ec
u
r
ity
in
v
ir
t
u
al
m
ac
h
in
es with
in
th
e
clo
u
d
co
m
p
r
o
m
is
es d
ata
in
teg
r
ity
,
co
n
f
id
en
tiality
,
an
d
av
aila
b
ilit
y
.
R
esear
ch
er
s
p
r
o
p
o
s
ed
a
Mo
b
ileNet
-
b
ased
ap
p
r
o
ac
h
to
en
h
a
n
ce
d
ata
s
ec
u
r
ity
i
n
th
e
clo
u
d
with
h
i
g
h
er
ac
c
u
r
ac
y
.
Mu
n
ee
r
et
a
l.
[
4
]
in
teg
r
ated
s
e
cu
r
ity
n
o
tatio
n
s
in
to
a
u
n
if
ied
to
o
l,
f
o
llo
wed
b
y
th
e
ev
alu
ati
o
n
o
f
th
eir
ef
f
ec
tiv
en
ess
th
r
o
u
g
h
ex
p
er
i
m
en
ts
in
v
o
l
v
in
g
h
u
m
an
s
u
b
je
cts.
Ash
r
af
et
a
l.
[
5
]
p
r
o
p
o
s
e
d
g
u
id
elin
es
f
o
r
t
h
e
s
ec
u
r
ity
ass
ess
m
en
t
o
f
an
en
t
er
p
r
is
e
ap
p
licatio
n
s
wh
ic
h
we
r
e
an
aly
ze
d
in
a
b
etter
way
.
Dif
f
er
en
t
alg
o
r
ith
m
s
wer
e
in
tr
o
d
u
ce
d
to
s
ec
u
r
e
s
en
s
itiv
e
in
f
o
r
m
atio
n
an
d
p
er
s
o
n
ally
id
en
tifia
b
le
d
ata
f
o
r
clo
u
d
s
ec
u
r
ity
.
Am
o
n
g
th
em
,
ad
v
an
ce
d
en
cr
y
p
tio
n
s
tan
d
ar
d
was
u
s
ed
wh
ic
h
en
c
r
y
p
ts
a
lar
g
e
am
o
u
n
t
o
f
d
ata,
an
d
is
m
o
r
e
ef
f
icien
t.
A
s
ec
u
r
e
m
o
d
el
was
p
r
o
p
o
s
ed
to
d
etec
t
attac
k
s
o
n
web
-
b
ased
ap
p
licatio
n
s
.
T
h
is
C
ap
s
u
leNu
t
m
o
d
el
in
clu
d
es
d
ec
o
d
in
g
,
g
e
n
er
aliza
tio
n
,
s
tan
d
ar
d
izatio
n
,
a
n
d
v
ec
to
r
izatio
n
.
2
.
1
.
Securit
y
re
qu
irem
ent
s
us
ing
risk
a
s
s
e
s
s
m
ent
t
ec
hn
i
qu
es
A
t
t
a
c
k
t
r
ee
s
u
s
e
a
t
r
e
e
s
t
r
u
c
tu
r
e
t
o
m
o
d
e
l
a
t
t
a
c
k
s
w
h
e
r
e
th
e
r
o
o
t
r
e
p
r
e
s
e
n
t
s
t
h
e
t
a
r
g
et
a
n
d
l
e
a
v
e
s
r
e
p
r
e
s
e
n
t
m
e
a
n
s
o
f
a
c
h
i
e
v
i
n
g
t
h
e
t
a
r
g
e
t
.
T
o
d
e
s
i
g
n
a
n
at
ta
c
k
t
r
e
e
,
t
h
e
a
t
t
a
c
k
e
r
’
s
c
h
a
r
ac
t
e
r
i
s
t
i
cs
m
u
s
t
b
e
c
o
n
s
i
d
e
r
e
d
[
6
]
.
M
cD
e
r
m
o
t
t
m
o
d
e
l
e
d
a
t
t
a
c
k
n
e
t
s
u
s
i
n
g
p
et
r
i
n
e
t
s
[
7
]
.
A
n
a
t
ta
c
k
’
s
p
r
o
g
r
e
s
s
is
r
e
p
r
es
e
n
t
e
d
b
y
m
e
a
n
s
o
f
t
o
k
e
n
s
t
h
a
t
c
a
n
m
o
v
e
a
l
o
n
g
t
h
e
a
r
c
s
.
A
t
t
a
c
k
g
r
a
p
h
s
a
r
e
u
s
e
d
f
o
r
m
o
d
e
l
i
n
g
c
o
m
p
u
t
e
r
n
e
t
w
o
r
k
v
u
l
n
e
r
a
b
i
l
i
t
ie
s
,
a
n
d
d
i
r
e
c
t
e
d
g
r
a
p
h
s
a
r
e
u
s
e
d
f
o
r
m
o
d
e
l
i
n
g
a
tta
c
k
g
r
a
p
h
s
[
8
]
.
V
u
l
n
e
r
a
b
il
i
ti
e
s
,
s
y
s
t
e
m
s
,
a
n
d
u
s
e
r
s
a
r
e
i
l
l
u
s
t
r
a
t
e
d
b
y
n
o
d
e
s
,
w
h
e
r
e
a
t
t
a
c
k
e
r
a
c
ti
o
n
s
a
r
e
s
h
o
w
n
w
i
t
h
e
d
g
e
s
.
Us
e
c
as
e
s
we
r
e
i
n
t
r
o
d
u
c
e
d
t
o
m
o
d
e
l
a
s
y
s
te
m
’
s
u
n
w
a
n
t
e
d
b
e
h
a
v
i
o
r
.
T
h
i
s
t
e
c
h
n
i
q
u
e
i
s
r
e
f
e
r
r
e
d
t
o
a
s
a
m
i
s
u
s
e
c
a
s
e
.
M
i
s
u
s
e
c
as
e
s
ar
e
u
s
e
d
t
o
p
r
e
d
i
c
t
a
n
a
t
t
a
c
k
.
F
i
g
u
r
e
1
s
h
o
w
s
a
m
is
u
s
e
c
a
s
e
m
o
d
e
l
i
n
d
i
ca
t
i
n
g
a
h
ac
k
e
r
’
s
a
tt
a
c
k
,
w
h
e
r
e
s
e
c
u
r
i
t
y
c
a
n
b
e
c
o
m
p
r
o
m
i
s
e
d
b
y
e
x
p
l
o
i
t
i
n
g
t
h
e
a
u
t
h
e
n
ti
c
a
ti
o
n
p
r
o
c
e
s
s
u
s
i
n
g
a
v
a
li
d
a
c
c
o
u
n
t
o
r
b
y
m
e
a
n
s
o
f
a
d
i
c
t
i
o
n
a
r
y
a
tt
a
c
k
[
9
]
.
Use
ca
s
es
ca
n
b
e
u
s
ed
to
d
e
p
ict
h
o
w
a
u
s
er
ca
n
h
ar
m
th
e
s
y
s
tem
.
T
h
is
m
eth
o
d
was
ter
m
ed
as
a
n
ab
u
s
e
ca
s
e
[
1
0
]
.
I
n
th
is
m
o
d
el,
a
leg
itima
te
u
s
er
ca
n
p
er
f
o
r
m
m
alicio
u
s
ac
tiv
ities
b
y
u
s
in
g
th
e
p
er
s
o
n
a
l
p
r
iv
ileg
es
p
r
o
v
id
e
d
.
Fig
u
r
e
2
s
h
o
ws
h
o
w
a
m
alicio
u
s
s
tu
d
e
n
t
ca
n
ex
p
lo
it
a
lab
s
y
s
tem
.
N
ev
er
th
eless
,
s
y
s
tem
q
u
ality
r
eq
u
ir
e
m
en
ts
en
g
in
ee
r
in
g
(
SQUAR
E
)
,
is
a
9
-
s
tep
p
r
o
ce
s
s
f
o
r
elab
o
r
atin
g
an
in
f
o
r
m
atio
n
s
y
s
tem
’
s
s
ec
u
r
ity
r
eq
u
ir
em
e
n
ts
[
1
1
]
.
T
h
e
g
o
al
is
to
d
ev
elo
p
a
v
iew
o
f
s
ec
u
r
ity
r
eq
u
i
r
em
en
ts
in
th
e
in
itial
s
tag
es
o
f
d
ev
elo
p
m
e
n
t.
UM
L
Sec,
an
ex
ten
s
io
n
to
UM
L
[
1
2
]
,
u
s
es
s
ter
eo
ty
p
es
an
d
ad
v
er
s
ar
y
m
o
d
els
[
1
3
]
,
t
o
in
co
r
p
o
r
ate
in
f
o
r
m
atio
n
r
elate
d
to
s
ec
u
r
ity
in
to
UM
L
d
iag
r
am
s
.
T
h
e
f
o
cu
s
o
f
Secu
r
eUM
L
is
o
n
d
is
tr
ib
u
ted
s
y
s
tem
p
o
licies
an
d
co
n
tr
o
l.
Ad
d
itio
n
ally
,
th
e
a
p
p
r
o
a
ch
d
o
es
n
o
t
p
r
o
p
o
s
e
an
y
n
o
tatio
n
s
,
b
u
t
r
ath
er
a
s
ec
u
r
ity
an
n
o
tatio
n
f
o
r
m
.
T
h
e
e
x
ten
d
ed
UM
L
s
tates
ch
ar
t
n
o
tatio
n
in
tr
o
d
u
ce
s
d
if
f
e
r
en
t
s
tates
s
u
ch
as
th
r
ea
ten
ed
,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
co
mp
a
r
is
o
n
o
f
a
p
p
r
o
a
ch
es
fo
r
mo
d
elin
g
s
o
ftw
a
r
e
s
ec
u
r
ity
…
(
S
ye
d
Mu
h
a
mma
d
J
u
n
a
i
d
Ha
s
s
a
n
)
2913
v
u
ln
er
ab
le,
d
ef
en
s
iv
e,
co
m
p
r
o
m
is
ed
,
q
u
ar
an
tin
e,
an
d
r
ec
o
v
e
r
y
[
1
4
]
.
Hu
m
an
s
u
b
jects
-
b
ase
d
ev
alu
atio
n
is
u
s
ed
to
v
alid
ate
th
e
p
r
o
p
o
s
ed
n
o
tati
o
n
.
Fig
u
r
e
1.
A
m
is
u
s
e
ca
s
e
m
o
d
el
of
an
attac
k
[
9
]
F
i
g
u
r
e
2
.
A
n
a
b
u
s
e
c
a
s
e
m
o
d
e
l
o
f
a
n
a
t
t
a
c
k
[
1
0
]
2
.
2
.
Securit
y
re
qu
irem
ent
s
u
s
ing
s
ec
urit
y
n
o
t
a
t
i
o
ns
E
x
is
tin
g
n
o
tatio
n
s
o
f
B
u
s
in
ess
Pro
ce
s
s
Mo
d
elin
g
No
tatio
n
(
B
PMN)
d
o
n
o
t
r
ep
r
esen
t
av
ailab
ilit
y
,
in
teg
r
ity
,
an
d
co
n
f
id
en
tiality
.
T
h
er
ef
o
r
e,
it
h
as
b
ee
n
ex
ten
d
ed
to
p
r
o
v
id
e
s
ec
u
r
e
h
ea
lth
c
ar
e
p
r
o
ce
s
s
es.
T
h
is
s
ch
em
e
ca
n
b
e
u
s
ed
t
o
r
e
p
r
esen
t
ev
en
ts
s
u
ch
as
d
ata
s
ca
n
n
i
n
g
o
r
r
u
n
n
in
g
en
cr
y
p
tio
n
alg
o
r
i
th
m
s
.
T
h
e
au
th
o
r
s
h
av
e
p
r
o
p
o
s
ed
s
ev
e
n
s
ec
u
r
ity
ev
en
ts
f
o
r
c
o
n
c
e
p
t
u
a
l
r
ep
r
esen
tatio
n
o
f
au
th
e
n
ticatio
n
,
au
th
o
r
izatio
n
,
h
ar
m
p
r
o
tectio
n
,
ac
ce
s
s
co
n
tr
o
l,
n
o
n
-
r
ep
u
d
iatio
n
,
en
cr
y
p
ted
m
ess
ag
es,
an
d
s
ec
u
r
e
co
m
m
u
n
icati
o
n
in
th
e
co
n
tex
t
o
f
B
PMN
[
1
5
]
.
Dif
f
er
e
n
t
co
lo
r
s
wer
e
u
s
ed
to
r
ep
r
esen
t
s
ec
u
r
it
y
co
d
e
n
o
tatio
n
s
.
Am
o
n
g
th
e
m
,
wh
ite
r
ep
r
esen
ts
n
o
r
m
al
ac
tiv
ity
d
iag
r
a
m
s
,
r
ed
with
d
o
tted
lin
es
r
ep
r
esen
ts
attac
k
ac
tiv
ities
,
an
d
b
lu
e
r
e
p
r
esen
ts
d
ef
en
s
iv
e
ac
tiv
ity
co
m
p
o
n
en
ts
[
1
6
]
.
So
m
e
n
o
tatio
n
s
ar
e
co
n
f
u
s
in
g
to
in
ter
p
r
et
an
d
th
ey
can
co
n
v
ey
m
u
ltip
le
m
ea
n
in
g
s
.
A
s
tu
d
y
was
c
o
n
d
u
c
t
e
d
to
d
et
er
m
in
e
th
e
u
s
ab
ilit
y
of
th
e
n
o
tatio
n
.
SecBP
MN
in
clu
d
es
s
ec
u
r
ity
n
o
tatio
n
s
f
o
r
B
PMN,
s
u
ch
as
av
ailab
ilit
y
,
co
n
f
id
en
tiality
,
in
teg
r
ity
,
au
d
itab
ilit
y
,
ac
co
u
n
tab
ilit
y
,
n
o
n
-
r
ep
u
d
iatio
n
,
au
th
en
ticity
,
an
d
p
r
iv
ac
y
[
1
7
]
.
An
e
x
p
e
r
i
m
e
n
t
wa
s
c
o
n
d
u
c
t
e
d
in
w
h
i
c
h
a
s
e
t
of
s
e
c
u
r
it
y
n
o
t
a
t
i
o
n
s
w
e
r
e
s
e
l
e
ct
e
d
as
a
r
e
s
u
lt
of
a
s
t
u
d
e
n
t
-
d
r
awn
s
et
of
n
o
tatio
n
s
f
o
r
ce
r
tain
s
ec
u
r
ity
co
n
ce
p
ts
.
Valid
atio
n
of
t
h
ese
n
o
tatio
n
s
was
done
by
ex
p
er
ts
.
T
h
e
p
r
o
p
o
s
ed
s
e
c
u
r
i
t
y
n
o
tatio
n
s
can
be
s
ee
n
in
T
ab
le
1.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
2
9
1
1
-
2
9
2
7
2914
T
ab
le
1.
Secu
r
ity
co
n
ce
p
ts
an
d
n
o
tatio
n
s
in
b
u
s
in
ess
p
r
o
ce
s
s
es
[
1
8
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
A
v
a
i
l
a
b
i
l
i
t
y
A
c
c
e
ss
c
o
n
t
r
o
l
P
r
i
v
a
c
y
D
a
t
a
c
o
n
f
i
d
e
n
t
i
a
l
i
t
y
D
a
t
a
i
n
t
e
g
r
i
t
y
R
i
s
k
A
u
d
i
t
E
n
c
r
y
p
t
i
o
n
D
i
g
i
t
a
l
s
i
g
n
a
t
u
r
e
T
h
is
s
tu
d
y
is
lim
ited
to
b
u
s
in
e
s
s
p
r
o
ce
s
s
es,
an
d
a
s
tu
d
y
is
n
e
ed
ed
th
at
ex
p
lain
s
th
e
r
esu
lts
in
ter
m
s
o
f
th
e
to
tal
n
u
m
b
er
o
f
n
o
tatio
n
,
s
ec
u
r
ity
co
n
ce
p
ts
,
an
d
lan
g
u
a
g
es
u
s
ed
f
o
r
m
o
d
elin
g
.
Mo
r
e
o
v
er
,
to
o
l
s
u
p
p
o
r
t
is
m
is
s
in
g
an
d
th
e
s
ec
u
r
ity
co
n
ce
p
ts
ch
o
s
en
wer
e
also
lim
ited
[
18
]
.
R
o
d
r
í
g
u
ez
et
a
l.
[
1
5
]
p
r
e
s
en
ted
an
ex
ten
s
io
n
to
B
PMN
with
o
u
t
p
r
o
v
id
in
g
a
n
y
s
u
p
p
o
r
ti
n
g
to
o
l.
Ho
wev
er
,
th
ey
to
o
k
an
ex
am
p
le
o
f
a
h
ea
lth
ca
r
e
s
ce
n
ar
io
to
p
r
o
v
e
th
e
co
n
ce
p
t.
I
n
th
e
s
tu
d
y
,
n
o
s
ec
u
r
ity
ex
p
e
r
ts
wer
e
in
v
o
lv
ed
n
o
r
ad
d
itio
n
al
s
tu
d
ies
wer
e
ca
r
r
ied
o
u
t.
I
n
[
1
9
]
,
b
u
s
in
ess
p
r
o
ce
s
s
in
g
n
o
t
atio
n
is
p
r
esen
ted
b
y
s
im
p
ly
ex
ten
d
in
g
B
PMN.
I
n
ad
d
itio
n
,
wh
e
n
d
esig
n
in
g
th
ese
n
o
tatio
n
s
,
th
e
s
af
ety
an
d
s
ec
u
r
ity
o
f
ass
ets
in
th
e
f
o
o
d
in
d
u
s
tr
y
was
co
n
s
id
er
e
d
.
T
h
e
au
t
h
o
r
d
iv
id
e
d
ass
ets in
to
two
b
r
an
ch
es: p
h
y
s
ical
an
d
lo
g
ical
as sh
o
wn
i
n
T
ab
le
2
.
A
lim
ited
s
et
o
f
n
o
tatio
n
s
is
s
elec
ted
th
at
is
ap
p
licab
le
f
o
r
s
ec
u
r
ity
p
u
r
p
o
s
es.
Ma
in
es
et
a
l.
ar
g
u
e
th
at
n
o
tatio
n
s
u
s
ed
f
o
r
s
ec
u
r
it
y
m
u
s
t
be
a
tr
u
e
r
ep
r
esen
tatio
n
so
th
at
t
h
ey
ca
n
be
ea
s
ily
im
p
lem
en
ted
[
2
0
]
,
e.
g
.
,
u
s
in
g
a
wall
with
f
ir
e
to
r
ep
r
es
en
t
a
f
ir
ewa
ll.
T
h
is
d
is
p
lay
s
th
e
tr
u
e
ess
en
ce
of
th
e
co
n
ce
p
t
as
s
h
o
wn
in
T
ab
le
3
.
Or
g
an
izatio
n
al
tr
u
s
t
an
d
s
ec
u
r
ity
g
r
o
u
p
s
wer
e
ad
d
e
d
to
B
PMN
[
2
1
]
.
T
h
ese
n
o
tatio
n
s
a
r
e
an
ab
s
tr
ac
t
lev
el
r
ep
r
esen
tatio
n
o
f
s
tate
s
ec
u
r
i
ty
r
eq
u
i
r
em
en
ts
.
Ho
wev
e
r
,
no
s
tu
d
ies
h
a
v
e
b
ee
n
c
o
n
d
u
ct
ed
,
an
d
th
e
s
et
of
p
r
o
p
o
s
ed
n
o
tatio
n
s
is
also
lim
ited
.
Similar
ly
,
a
lim
ited
n
u
m
b
er
o
f
n
o
tatio
n
s
wer
e
p
r
esen
ted
in
[
2
2
]
,
[
2
3
]
.
T
h
e
p
r
o
p
o
s
ed
n
o
tatio
n
s
f
o
r
wo
r
k
f
lo
w
s
y
s
tem
s
ar
e
s
h
o
wn
in
T
ab
le
4.
Secu
r
ity
n
o
tatio
n
s
s
u
ch
as
in
teg
r
ity
,
av
ailab
ilit
y
,
an
d
c
o
n
f
id
e
n
tiality
wer
e
p
r
esen
ted
b
y
Altu
h
h
o
v
[
2
4
]
.
T
ab
le
2
.
C
o
n
tr
o
l f
o
r
p
h
y
s
ical
an
d
lo
g
ical
ass
ets
[
1
9
]
P
h
y
s
i
c
a
l
a
sse
t
s
N
o
t
a
t
i
o
n
Lo
g
i
c
a
l
a
ss
e
t
s
N
o
t
a
t
i
o
n
D
e
e
p
-
F
r
o
z
e
n
P
r
i
v
a
t
e
Li
g
h
t
-
S
e
n
s
i
t
i
v
e
F
i
n
a
n
c
i
a
l
Ex
p
l
o
si
v
e
Le
g
a
l
P
o
i
s
o
n
o
u
s
C
o
n
f
i
d
e
n
t
i
a
l
R
a
d
i
o
a
c
t
i
v
e
A
u
d
i
t
-
R
e
l
e
v
a
n
t
T
ab
le
3.
C
y
b
er
-
s
ec
u
r
ity
o
n
to
lo
g
y
f
o
r
B
PMN
[
2
0
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
N
o
t
a
t
i
o
n
F
i
r
e
w
a
l
l
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
co
mp
a
r
is
o
n
o
f
a
p
p
r
o
a
ch
es
fo
r
mo
d
elin
g
s
o
ftw
a
r
e
s
ec
u
r
ity
…
(
S
ye
d
Mu
h
a
mma
d
J
u
n
a
i
d
Ha
s
s
a
n
)
2915
T
a
b
l
e
4
.
S
e
c
u
r
i
t
y
n
o
t
a
ti
o
n
s
f
o
r
w
o
r
k
-
f
l
o
w
[2
3
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
N
o
t
a
t
i
o
n
s
S
e
p
a
r
a
t
i
o
n
of
d
u
t
y
B
i
n
d
i
n
g
of
d
u
t
y
T
h
e
a
u
t
h
o
r
’
s
a
r
g
u
m
e
n
t
r
e
g
a
r
d
i
n
g
n
o
t
a
t
i
o
n
s
is
t
h
a
t
t
h
e
y
la
c
k
a
t
t
e
n
ti
o
n
t
o
s
e
c
u
r
it
y
c
o
n
c
e
r
n
s
.
T
h
is
r
e
s
e
a
r
c
h
f
o
c
u
s
e
s
o
n
c
o
m
p
l
e
t
e
m
e
d
i
a
t
i
o
n
,
p
o
li
c
i
es
,
c
r
y
p
t
o
g
r
a
p
h
y
,
c
r
e
d
e
n
t
i
a
ls
,
a
n
d
i
n
t
e
r
c
ep
t
i
o
n
.
A
t
o
o
l
w
as
d
e
v
e
l
o
p
e
d
t
o
g
a
t
h
e
r
v
a
r
i
o
u
s
c
o
n
c
e
p
t
u
a
l
p
a
t
te
r
n
s
f
r
o
m
l
it
e
r
a
t
u
r
e
.
W
h
il
e
m
a
n
y
n
o
t
a
ti
o
n
s
w
e
r
e
d
e
s
c
r
i
b
e
d
b
as
e
d
o
n
t
e
x
t
s
,
t
h
e
i
r
v
is
u
a
l
r
e
p
r
e
s
e
n
t
a
ti
o
n
w
a
s
m
is
s
i
n
g
[
2
5
]
.
T
h
e
M
A
SC
m
o
d
e
l
i
n
g
a
r
c
h
it
e
c
t
u
r
e
c
a
n
b
e
v
i
e
w
e
d
i
n
T
a
b
l
e
5
.
Secu
r
ity
is
not
a
s
ep
ar
ate
co
n
c
er
n
th
at
s
h
o
u
ld
be
co
n
s
id
er
e
d
o
n
ly
in
th
e
in
itial
s
tag
es
of
th
e
r
e
q
u
ir
em
en
t
g
ath
er
in
g
p
r
o
ce
s
s
.
T
h
e
a
u
th
o
r
p
r
o
p
o
s
ed
a
s
et
o
f
n
o
tatio
n
s
th
at
ca
n
b
e
im
p
lem
en
te
d
u
s
in
g
UM
L
an
d
o
t
h
e
r
m
o
d
elin
g
t
o
o
ls
[
2
6
]
.
T
h
ese
n
o
tatio
n
s
ca
n
b
e
u
s
ed
f
o
r
d
esig
n
in
g
th
e
s
ec
u
r
ity
o
f
clien
t
-
s
er
v
er
s
y
s
tem
s
[
2
7
]
.
B
u
s
in
ess
d
esig
n
er
s
elicited
th
e
s
ec
u
r
ity
r
eq
u
ir
em
en
ts
at
a
c
o
n
ce
p
tu
al
lev
el
,
wh
ich
wer
e
l
ater
im
p
lem
en
ted
b
y
d
ev
elo
p
er
s
b
ased
o
n
th
o
s
e
r
eq
u
ir
em
en
ts
.
Similar
ly
,
a
UM
L
-
b
ased
tactic
f
o
r
SOA
ap
p
licati
o
n
s
was
p
r
esen
ted
in
[
2
8
]
,
as
s
h
o
wn
in
T
a
b
le
6.
An
ac
tiv
ity
d
ia
g
r
am
was
u
s
ed
to
in
co
r
p
o
r
ate
p
r
o
p
o
s
ed
s
ec
u
r
i
ty
n
o
tatio
n
s
,
a
n
d
a
p
r
o
o
f
of
co
n
ce
p
t
was
g
iv
en
by
d
ep
ictin
g
a
h
ea
lth
ca
r
e
s
ce
n
ar
io
[
2
9
]
.
As
d
is
cu
s
s
ed
ea
r
lier
,
s
im
ilar
n
o
tatio
n
s
wer
e
p
r
o
p
o
s
ed
f
o
r
UM
L
,
lik
e
B
PMN.
T
h
e
p
r
o
p
o
s
ed
n
o
t
atio
n
s
ar
e
d
is
p
lay
ed
in
T
ab
le
7
.
T
ab
le
5.
MA
SC
m
o
d
elin
g
ar
ch
itectu
r
al
s
ec
u
r
ity
co
n
ce
p
ts
[
2
5
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
s
s
i
o
n
D
a
t
a
is
s
t
o
r
e
d
E
n
f
o
r
c
e
m
e
n
t
S
e
ssi
o
n
i
n
i
t
i
a
l
i
z
e
d
S
e
ssi
o
n
c
l
o
s
e
d
A
d
m
i
n
i
s
t
r
a
t
i
o
n
E
n
c
r
y
p
t
i
o
n
S
i
g
n
i
n
g
D
e
c
i
s
i
o
n
H
a
s
h
i
n
g
K
e
y
s
I
n
f
o
r
m
a
t
i
o
n
T
ab
le
6.
SOA
s
ec
u
r
ity
n
o
tatio
n
s
[
2
8
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
D
a
t
a
i
n
t
e
g
r
i
t
y
N
o
n
-
r
e
p
u
d
i
a
t
i
o
n
A
u
t
h
o
r
i
z
a
t
i
o
n
A
v
a
i
l
a
b
i
l
i
t
y
A
u
t
h
e
n
t
i
c
a
t
i
o
n
Tr
a
c
e
a
b
i
l
i
t
y
a
n
d
a
u
d
i
t
i
n
g
T
ab
le
7.
UM
L
s
ec
u
r
ity
m
o
d
elin
g
ex
ten
s
io
n
s
[
2
9
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
a
u
d
i
t
i
n
g
S
e
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
N
o
n
-
r
e
p
u
d
i
a
t
i
o
n
I
n
t
e
g
r
i
t
y
A
c
c
e
ss
c
o
n
t
r
o
l
P
r
i
v
a
c
y
2
.
2
.
1
.
I
nd
epen
dent
m
o
delin
g
n
o
t
a
t
i
o
n
s
I
n
[
3
0
]
,
a
v
i
s
u
a
l
l
a
n
g
u
a
g
e
f
o
r
a
u
t
h
o
r
i
z
a
t
i
o
n
c
o
n
t
r
o
l
s
w
as
d
i
s
c
u
s
s
e
d
.
T
h
e
m
a
i
n
n
o
t
a
t
i
o
n
u
s
e
d
t
o
r
e
p
r
e
s
e
n
t
a
u
t
h
o
r
i
z
a
t
i
o
n
is
a
p
i
e
c
e
o
f
p
a
p
e
r
w
i
t
h
a
s
i
g
n
a
t
u
r
e
,
a
n
d
a
f
e
w
s
u
p
p
o
r
t
i
n
g
n
o
t
a
t
i
o
n
s
we
r
e
a
ls
o
p
r
o
p
o
s
e
d
.
T
a
b
l
e
8
s
h
o
w
s
t
h
e
n
o
t
at
i
o
n
s
o
f
t
h
e
v
is
u
a
l
l
a
n
g
u
a
g
e
f
o
r
a
u
t
h
o
r
iz
a
t
i
o
n
m
o
d
e
l
i
n
g
[
3
1
]
.
T
h
e
n
o
t
a
t
i
o
n
s
ar
e
v
a
g
u
e
w
h
e
n
u
s
e
d
i
n
d
e
p
e
n
d
e
n
t
l
y
,
a
s
t
h
e
i
r
m
e
a
n
in
g
i
s
u
n
c
l
e
a
r
a
n
d
n
o
t
o
o
l
s
w
e
r
e
p
r
o
v
i
d
e
d
.
F
u
r
t
h
e
r
m
o
r
e
,
n
o
u
s
e
r
s
t
u
d
i
e
s
w
e
r
e
c
o
n
d
u
c
t
e
d
.
I
n
c
o
n
t
r
a
s
t
,
e
x
t
e
n
s
iv
e
u
s
e
r
s
t
u
d
i
es
w
e
r
e
c
o
n
d
u
c
t
e
d
u
s
i
n
g
a
l
a
r
g
e
r
s
et
o
f
n
o
t
a
t
i
o
n
s
.
L
i
t
e
r
a
t
u
r
e
i
n
d
i
ca
t
es
t
h
a
t
d
e
f
a
c
t
o
s
o
f
t
w
a
r
e
m
o
d
e
l
i
n
g
t
o
o
l
s
h
a
v
e
n
o
t
i
n
c
o
r
p
o
r
a
t
e
d
t
h
e
s
e
s
e
c
u
r
i
t
y
n
o
t
a
t
i
o
n
s
.
T
h
i
s
im
p
l
i
e
s
t
h
e
n
e
e
d
t
o
i
n
c
o
r
p
o
r
a
t
e
t
h
e
s
e
s
e
c
u
r
it
y
n
o
t
a
ti
o
n
s
i
n
a
u
n
i
f
i
e
d
wa
y
w
h
i
c
h
is
th
e
o
b
j
e
c
t
i
v
e
o
f
t
h
is
s
t
u
d
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
2
9
1
1
-
2
9
2
7
2916
T
ab
le
8.
Vis
u
al
lan
g
u
ag
e
f
o
r
au
th
o
r
izatio
n
m
o
d
elin
g
[
3
0
]
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
s
N
o
t
a
t
i
o
n
s
A
u
t
h
o
r
i
z
a
t
i
o
n
on
a
f
o
r
m
V
a
l
i
d
U
s
e
d
V
a
l
i
d
a
n
d
p
u
t
on
h
o
l
d
I
n
v
a
l
i
d
U
n
u
s
e
d
2
.
3
.
UM
L
ex
t
ens
io
n
me
c
h
a
n
is
m
T
h
e
UM
L
e
x
ten
s
io
n
m
ec
h
an
is
m
allo
ws
d
ev
elo
p
er
s
to
cu
s
to
m
ize
an
d
en
h
a
n
ce
s
tan
d
ar
d
U
ML
m
o
d
els
to
b
etter
f
it
s
p
ec
if
ic
d
o
m
ain
s
o
r
r
eq
u
ir
em
en
ts
.
I
t
in
clu
d
es
co
n
s
tr
u
cts
lik
e
s
ter
eo
ty
p
es
,
tag
g
ed
v
alu
es
,
a
n
d
co
n
s
tr
ain
ts
,
wh
ich
en
ab
le
th
e
ad
d
itio
n
o
f
n
ew
s
em
an
tics
o
r
p
r
o
p
er
ties
to
ex
is
tin
g
UM
L
elem
en
ts
with
o
u
t
alter
in
g
th
e
co
r
e
UM
L
s
p
ec
if
icatio
n
.
T
h
is
f
lex
ib
ilit
y
s
u
p
p
o
r
ts
d
o
m
ai
n
-
s
p
ec
if
ic
m
o
d
elin
g
,
s
u
ch
as
in
co
r
p
o
r
atin
g
s
ec
u
r
ity
,
p
er
f
o
r
m
an
ce
,
o
r
p
latf
o
r
m
-
s
p
ec
if
ic
c
o
n
ce
r
n
s
d
ir
ec
tly
i
n
to
d
iag
r
am
s
.
In
th
is
s
ec
tio
n
,
we
will d
is
cu
s
s
th
ese
m
ec
h
an
is
m
s
with
ex
am
p
les
.
2
.
3
.
1
.
Co
ns
t
ra
ints
T
h
ey
ar
e
u
s
ed
to
c
r
ea
te
n
ew
s
em
an
tics
,
p
r
o
p
er
ties
f
o
r
s
p
ec
if
y
in
g
s
em
an
tics
,
an
d
/o
r
c
o
n
d
iti
o
n
s
.
T
h
ey
a
r
e
s
p
e
c
i
f
i
e
d
by
u
s
i
n
g
a
s
t
r
i
n
g
e
n
c
l
o
s
e
d
by
b
r
a
c
k
e
ts
.
F
i
g
u
r
e
3
(
a
)
,
s
h
o
w
s
a
s
i
m
p
l
e
e
x
a
m
p
l
e
of
u
s
i
n
g
c
o
n
s
t
r
a
i
n
ts
in
a
UM
L
m
o
d
el.
T
h
is
UM
L
class
d
iag
r
am
r
ep
r
esen
ts
a
s
y
s
tem
with
in
d
iv
id
u
als,
f
in
a
n
cial
ac
co
u
n
ts
,
an
d
o
r
g
an
izatio
n
s
,
in
co
r
p
o
r
atin
g
r
u
les
to
en
s
u
r
e
d
ata
i
n
teg
r
ity
a
n
d
s
ec
u
r
ity
.
T
h
e
Per
s
o
n
class
in
clu
d
es
g
en
d
er
a
n
d
o
p
tio
n
al
s
p
o
u
s
e
ass
o
ciatio
n
s
,
with
co
n
s
tr
ain
ts
en
f
o
r
cin
g
h
et
er
o
s
ex
u
al
r
elatio
n
s
h
ip
s
.
T
h
e
B
an
k
Acc
o
u
n
t
class
is
lin
k
ed
to
b
o
th
a
p
o
r
tf
o
lio
an
d
a
r
eq
u
ir
ed
co
r
p
o
r
atio
n
,
an
d
is
m
ar
k
ed
with
a
{secu
r
e}
tag
to
h
ig
h
lig
h
t
th
e
n
ee
d
f
o
r
s
ec
u
r
ity
m
ea
s
u
r
es.
Ov
er
al
l,
th
e
d
iag
r
am
o
u
tlin
es
k
ey
s
tr
u
ctu
r
al
r
elatio
n
s
h
ip
s
an
d
em
b
ed
s
b
u
s
in
ess
r
u
les
alo
n
g
s
id
e
s
ec
u
r
ity
co
n
s
id
er
atio
n
s
.
2
.
3
.
2
.
T
a
g
g
ed
v
a
l
u
e
s
T
h
ey
allo
w
th
e
cr
ea
tio
n
o
f
n
e
w
p
r
o
p
er
ties
s
p
ec
if
ied
in
t
h
e
f
o
r
m
o
f
k
ey
wo
r
d
-
v
alu
e
p
air
s
a
n
d
e
x
ten
d
UM
L
b
u
ild
in
g
b
lo
c
k
s
b
y
cr
ea
t
in
g
n
ew
in
f
o
r
m
atio
n
f
o
r
th
e
elem
en
t.
T
ag
g
ed
v
alu
es
can
be
cr
ea
ted
f
o
r
ex
is
tin
g
m
o
d
el
elem
en
ts
or
s
ter
eo
ty
p
e
s
.
T
ag
g
ed
v
alu
es
ar
e
not
clas
s
attr
ib
u
tes.
Fig
u
r
e
3
(
b
)
,
d
em
o
n
s
tr
ates
th
e
u
s
e
of
tag
g
ed
v
alu
es.
”Ve
r
s
io
n
=3
.
2
”
is
a
tag
g
ed
v
alu
e
an
d
not
an
attr
ib
u
te
o
f
th
e
class
.
T
h
e
tag
g
ed
v
alu
e
i
n
th
is
ex
am
p
le
m
ay
b
e
u
s
ef
u
l f
o
r
s
o
f
twar
e
d
ev
elo
p
e
r
s
.
(
a)
(
b
)
(
c)
Fig
u
r
e
3
.
UM
L
e
x
ten
s
io
n
m
ec
h
an
is
m
co
n
s
tr
u
cts:
(
a)
c
o
n
s
t
r
a
i
n
t
s
,
(
b
)
t
ag
g
ed
v
a
l
u
e
s
,
a
n
d
(
c)
s
ter
eo
ty
p
e
s
2
.
3
.
3
.
Ste
re
o
t
y
pes
Allo
w
th
e
ex
ten
s
io
n
o
f
t
h
e
v
o
ca
b
u
lar
y
o
f
UM
L
to
cr
ea
te
n
e
w
m
o
d
el
elem
en
ts
d
er
iv
e
d
f
r
o
m
ex
is
tin
g
o
n
es.
T
h
e
n
ewly
cr
ea
ted
el
em
en
ts
h
av
e
s
p
ec
if
ic
p
r
o
p
er
ties
s
u
itab
le
f
o
r
a
p
ar
ticu
la
r
p
r
o
b
lem
d
o
m
ain
.
Gr
ap
h
ically
,
a
s
ter
eo
ty
p
e
is
r
en
d
er
ed
as
a
n
am
e
e
n
clo
s
ed
b
y
g
u
illem
ets.
Fig
u
r
e
3
(
c
)
,
s
h
o
ws
s
o
m
e
ex
am
p
les
of
s
ter
eo
ty
p
ed
m
o
d
elin
g
elem
en
ts
.
B
y
u
s
in
g
th
e
‘
n
etwo
r
k
n
o
d
e
’
s
ter
eo
ty
p
e,
th
e
f
ir
ewa
ll,
r
o
u
t
er
,
an
d
h
u
b
m
ay
b
e
u
s
ed
as
f
ir
s
t
-
clas
s
citizen
s
wh
en
m
o
d
elin
g
th
e
s
y
s
tem
,
th
u
s
a
d
d
in
g
m
o
r
e
s
e
m
an
tics
to
th
e
d
esig
n
.
W
ith
th
e
im
p
ac
t
o
f
r
ap
id
tech
n
o
lo
g
ical
c
h
an
g
es,
c
y
b
e
r
s
ec
u
r
ity
-
r
elate
d
c
o
n
ce
p
ts
ar
e
d
if
f
icu
lt
to
u
n
d
er
s
tan
d
.
Vallab
h
an
en
i
et
a
l.
p
r
o
p
o
s
ed
a
b
id
i
r
ec
tio
n
al
g
e
n
er
ativ
e
ad
v
er
s
ar
ial
n
etwo
r
k
a
p
p
r
o
ac
h
f
o
r
th
e
d
etec
tio
n
o
f
cy
b
er
-
attac
k
s
[
3
2
]
.
Vis
u
al
n
o
tatio
n
s
ca
n
b
e
u
s
ed
f
o
r
cy
b
e
r
s
ec
u
r
ity
r
esear
ch
.
Stu
r
d
ee
et
a
l.
m
ak
es
a
co
llectio
n
o
f
s
k
etch
es
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
co
mp
a
r
is
o
n
o
f
a
p
p
r
o
a
ch
es
fo
r
mo
d
elin
g
s
o
ftw
a
r
e
s
ec
u
r
ity
…
(
S
ye
d
Mu
h
a
mma
d
J
u
n
a
i
d
Ha
s
s
a
n
)
2917
ico
n
s
wh
ich
f
u
n
ctio
n
as
th
e
f
o
u
n
d
atio
n
f
o
r
cr
ea
tin
g
a
v
is
u
al
lan
g
u
ag
e
f
o
r
in
ter
f
ac
es
a
n
d
c
o
m
m
u
n
icatio
n
r
elate
d
to
cy
b
e
r
s
ec
u
r
ity
[
3
3
]
.
As
UM
L
s
ec
d
o
es
n
o
t
ex
p
licit
ly
ad
d
r
ess
es
ac
ce
s
s
co
n
tr
o
l,
an
ap
p
r
o
ac
h
was
p
r
o
p
o
s
ed
to
r
eso
lv
e
th
e
m
en
tio
n
ed
c
h
allen
g
es
b
y
e
n
h
an
cin
g
UM
L
th
r
o
u
g
h
th
e
in
cl
u
s
io
n
o
f
s
ec
u
r
ity
d
iag
r
am
s
,
wh
ich
will
s
er
v
e
to
d
ep
ict
m
an
d
at
o
r
y
ac
ce
s
s
co
n
t
r
o
l
(
MA
C
)
,
d
is
cr
etio
n
ar
y
ac
c
ess
co
n
tr
o
l
(
DAC),
an
d
r
o
le
b
ased
ac
ce
s
s
co
n
tr
o
l
(
R
B
A
C
)
p
o
licies
as
in
teg
r
al
c
o
m
p
o
n
en
ts
[
3
4
]
.
B
asin
et
a
l.
p
r
o
p
o
s
ed
an
a
p
p
r
o
ac
h
ca
lled
m
o
d
el
d
r
i
v
en
s
ec
u
r
it
y
to
b
u
ild
a
s
ec
u
r
e
s
y
s
tem
.
I
n
s
tead
o
f
p
r
escr
ib
i
n
g
a
s
p
ec
if
ic
m
o
d
elin
g
la
n
g
u
a
g
e
f
o
r
th
is
p
r
o
ce
d
u
r
e
,
th
ey
s
u
g
g
ested
a
co
m
p
r
eh
en
s
iv
e
f
r
am
ewo
r
k
f
o
r
d
ev
elo
p
i
n
g
s
u
ch
lan
g
u
a
g
es
b
y
in
te
g
r
atin
g
s
y
s
tem
s
m
o
d
elin
g
lan
g
u
ag
es
with
s
ec
u
r
ity
m
o
d
elin
g
lan
g
u
ag
es
[3
5
]
.
T
h
e
y
s
h
o
wca
s
e
v
ar
io
u
s
ex
am
p
les
o
f
th
is
f
r
am
ewo
r
k
,
d
em
o
n
s
tr
atin
g
th
e
s
y
n
th
esis
o
f
v
a
r
io
u
s
UM
L
m
o
d
elin
g
l
an
g
u
ag
es
with
a
s
ec
u
r
ity
m
o
d
elin
g
lan
g
u
ag
e
to
ar
ticu
late
ac
ce
s
s
co
n
tr
o
l r
eq
u
ir
em
en
ts
in
a
f
o
r
m
al
m
an
n
e
r
.
2
.
4
.
Securit
y
re
qu
irem
ent
s
a
nd
UM
L
Sec
T
h
is
s
ec
tio
n
b
r
ief
ly
d
is
cu
s
s
e
s
th
e
s
ec
u
r
ity
r
eq
u
ir
em
en
ts
th
at
ar
e
n
ee
d
ed
to
be
ac
h
ie
v
e
d
wh
ile
m
o
d
elin
g
an
y
s
ec
u
r
e
s
y
s
tem
.
T
h
e
f
o
llo
win
g
s
ec
u
r
ity
r
eq
u
ir
em
en
ts
h
av
e
b
ee
n
id
e
n
tifie
d
b
y
[3
6
]
,
an
d
a
r
e
m
an
d
ato
r
y
to
ac
h
iev
e
f
o
r
an
y
s
y
s
tem
to
b
e
s
ec
u
r
e
f
r
o
m
th
r
ea
ts
.
Key
s
ec
u
r
ity
r
eq
u
ir
e
m
en
ts
s
u
p
p
o
r
ted
b
y
UM
L
Sec
in
clu
d
e
f
air
ex
c
h
an
g
e
,
s
ec
u
r
e
lin
k
s
,
s
ec
u
r
e
d
ep
en
d
en
cies
,
g
u
ar
d
ed
ac
ce
s
s
,
n
o
d
o
wn
-
f
lo
w
an
d
n
o
u
p
-
f
lo
w
p
o
licies,
en
s
u
r
in
g
th
at
b
o
th
s
tr
u
ctu
r
al
an
d
b
eh
av
i
o
r
al
asp
ec
ts
o
f
s
ec
u
r
ity
ar
e
co
n
s
id
er
ed
d
u
r
in
g
s
y
s
tem
d
ev
elo
p
m
e
n
t.
Secu
r
ity
R
eq
u
ir
em
en
ts
f
o
r
th
r
ea
t
f
r
ee
s
y
s
tem
s
ar
e
m
e
n
tio
n
ed
in
T
ab
le
9
.
T
h
e
UM
L
s
ter
eo
ty
p
es
u
s
ed
f
o
r
t
h
ese
s
ec
u
r
ity
r
eq
u
ir
e
m
en
ts
will b
e
d
is
cu
s
s
ed
in
th
e
n
ex
t sectio
n
.
T
ab
le
9
.
Descr
ip
tio
n
o
f
s
ec
u
r
it
y
r
eq
u
i
r
em
en
ts
S
e
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
D
e
s
c
r
i
p
t
i
o
n
F
a
i
r
e
x
c
h
a
n
g
e
P
r
e
v
e
n
t
t
h
e
p
a
r
t
i
c
i
p
a
n
t
s
f
r
o
m
c
h
e
a
t
i
n
g
N
o
n
-
r
e
p
u
d
i
a
t
i
o
n
Th
e
a
c
t
i
o
n
c
a
n
n
o
t
su
b
se
q
u
e
n
t
l
y
be
d
e
n
i
e
d
R
o
l
e
b
a
se
d
a
c
c
e
ss
c
o
n
t
r
o
l
A
mec
h
a
n
i
sm
f
o
r
c
o
n
t
r
o
l
l
i
n
g
a
c
c
e
ss
to
p
r
o
t
e
c
t
e
d
r
e
s
o
u
r
c
e
s
,
a
ssi
g
n
p
e
r
m
i
ssi
o
n
s
to
r
o
l
e
s
,
i
n
st
e
a
d
of
a
ssi
g
n
i
n
g
to
p
e
o
p
l
e
S
e
c
u
r
e
c
o
mm
u
n
i
c
a
t
i
o
n
l
i
n
k
P
r
e
serv
e
‘
S
e
c
r
e
c
y
’
a
n
d
‘
I
n
t
e
g
r
i
t
y
’
o
f
t
h
e
d
a
t
a
i
n
t
r
a
n
si
t
S
e
c
r
e
c
y
a
n
d
i
n
t
e
g
r
i
t
y
D
a
t
a
s
h
o
u
l
d
b
e
r
e
a
d
o
n
l
y
b
y
t
h
e
l
e
g
i
t
i
m
a
t
e
p
a
r
t
i
e
s
(
S
e
c
r
e
c
y
)
,
D
a
t
a
s
h
o
u
l
d
b
e
m
o
d
i
f
i
e
d
o
n
l
y
b
y
t
h
e
l
e
g
i
t
i
m
a
t
e
p
a
r
t
i
e
s
(
I
n
t
e
g
r
i
t
y
)
A
u
t
h
e
n
t
i
c
i
t
y
M
e
ss
a
g
e
a
u
t
h
e
n
t
i
c
i
t
y
,
d
a
t
a
o
r
i
g
i
n
a
u
t
h
e
n
t
i
c
i
t
y
,
e
n
t
i
t
y
a
u
t
h
e
n
t
i
c
i
t
y
F
r
e
s
h
n
e
s
s
M
e
s
s
a
g
e
c
r
e
a
t
e
d
i
n
t
h
e
c
u
r
r
e
n
t
e
x
e
c
u
t
i
o
n
r
o
u
n
d
m
u
s
t
n
o
t
b
e
a
r
e
p
l
a
y
o
f
a
n
o
l
d
e
r
m
e
s
s
a
g
e
b
y
t
h
e
a
d
v
e
r
s
a
r
y
S
e
c
u
r
e
i
n
f
o
r
m
a
t
i
o
n
f
l
o
w
A
c
o
n
c
e
p
t
u
s
e
d
i
n
m
u
l
t
i
-
l
e
v
e
l
s
e
c
u
r
e
s
y
s
t
e
m
s
h
a
v
i
n
g
d
i
f
f
e
r
e
n
t
l
e
v
e
l
s
o
f
s
e
n
s
i
t
i
v
i
t
y
o
f
d
a
t
a
(
e
.
g
.
,
h
i
g
h
a
n
d
l
o
w
)
.
H
i
g
h
m
e
a
n
s
h
i
g
h
l
y
s
e
n
s
i
t
i
v
e
o
r
h
i
g
h
l
y
t
r
u
s
t
e
d
d
a
t
a
.
W
h
a
t
h
a
p
p
e
n
s
w
h
e
n
h
i
g
h
l
y
t
r
u
s
t
e
d
p
a
r
t
s
c
o
m
m
u
n
i
c
a
t
e
w
i
t
h
l
o
w
t
r
u
s
t
e
d
p
a
r
t
s
a
n
d
v
i
c
e
v
e
r
s
a
?
A
s
y
s
t
e
m
m
a
y
h
a
v
e
‘
N
o
d
o
w
n
-
f
l
o
w
’
a
n
d
/
o
r
‘
n
o
u
p
-
f
l
o
w
’
p
o
l
i
c
i
e
s
G
u
a
r
d
e
d
a
c
c
e
s
s
A
c
c
e
ss
c
o
n
t
r
o
l
,
e
n
s
u
r
e
t
h
a
t
o
n
l
y
l
e
g
i
t
i
mat
e
p
a
r
t
i
e
s
h
a
v
e
a
c
c
e
ss
to
s
e
c
u
r
e
p
a
r
t
of
t
h
e
s
y
s
t
e
m
3.
P
RO
P
O
SE
D
AP
P
RO
ACH
T
h
is
s
ec
tio
n
d
is
cu
s
s
es
th
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
.
T
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
co
m
p
r
is
es
o
f
4
s
te
p
s
,
th
e
f
ir
s
t
s
tep
d
ea
ls
with
ex
tr
ac
tio
n
o
f
s
y
m
b
o
ls
an
d
n
o
tatio
n
s
,
s
ec
o
n
d
s
tep
d
ea
ls
wi
th
s
elec
tio
n
o
f
ap
p
r
o
p
r
iate
n
o
tatio
n
f
o
r
r
ep
r
esen
tatio
n
o
f
a
s
ec
u
r
i
ty
co
n
ce
p
t,
s
tep
th
r
ee
d
ea
ls
with
co
n
v
er
s
io
n
o
f
th
ese
n
o
t
atio
n
s
an
d
s
ec
u
r
ity
co
n
ce
p
ts
to
s
ter
eo
ty
p
es
an
d
f
i
n
ally
th
e
s
tep
f
o
u
r
d
ea
ls
with
E
v
alu
atio
n
o
f
s
ter
eo
t
y
p
es
th
r
o
u
g
h
d
e
p
ictio
n
o
f
a
s
ce
n
ar
io
.
T
h
is
p
r
o
p
o
s
ed
4
s
tep
s
ap
p
r
o
ac
h
is
d
ep
icted
in
Fig
u
r
e
4
(
a)
,
(
b
)
,
(
c)
,
an
d
(
d
)
.
As
a
f
ir
s
t
s
tep
,
s
ec
u
r
ity
s
y
m
b
o
ls
an
d
n
o
tatio
n
s
u
s
ed
to
r
ep
r
esen
t
v
ar
io
u
s
b
asic
s
ec
u
r
ity
co
n
ce
p
ts
wer
e
co
llected
f
r
o
m
liter
atu
r
e.
A
s
e
t
o
f
9
4
s
ec
u
r
ity
n
o
tatio
n
s
an
d
s
y
m
b
o
ls
wer
e
g
ath
er
e
d
,
s
o
m
e
o
f
wh
ich
ar
e
d
is
cu
s
s
ed
in
th
e
r
elate
d
wo
r
k
s
ec
tio
n
d
u
e
to
lim
itatio
n
s
o
f
s
p
ac
e;
al
l
o
f
th
em
ca
n
n
o
t
b
e
d
is
cu
s
s
ed
h
er
e
b
u
t
ar
e
av
ailab
le
in
t
h
e
o
n
lin
e
r
e
p
o
s
ito
r
y
.
T
h
e
n
o
tatio
n
s
wer
e
th
e
n
r
e
d
r
a
wn
in
h
ig
h
q
u
ality
as
m
o
s
t
o
f
th
em
wer
e
n
o
t
av
ailab
le
p
u
b
l
icly
an
d
in
u
s
ab
le
f
o
r
m
at.
Af
ter
ac
c
o
u
n
tin
g
f
o
r
s
im
ilar
ity
an
d
co
n
s
id
er
in
g
b
a
s
ic
s
ec
u
r
ity
co
n
ce
p
ts
o
u
t
o
f
9
4
s
till
4
9
s
ec
u
r
ity
n
o
tatio
n
s
an
d
s
y
m
b
o
ls
wer
e
r
e
m
ain
in
g
.
I
n
th
e
s
ec
o
n
d
s
tep
,
s
ec
u
r
ity
s
y
m
b
o
ls
an
d
n
o
tatio
n
s
wer
e
d
iv
i
d
ed
in
to
g
r
o
u
p
s
ac
co
r
d
i
n
g
to
t
h
e
s
ec
u
r
ity
co
n
ce
p
ts
th
ey
wer
e
r
e
p
r
esen
tin
g
an
d
wer
e
p
r
esen
ted
to
th
e
p
ar
ticip
an
ts
o
f
s
u
r
v
e
y
wh
ich
was
co
n
d
u
cte
d
o
n
Am
az
o
n
m
ec
h
an
ical
T
u
r
k
.
T
h
e
p
ar
ticip
an
ts
wer
e
s
elec
ted
if
s
p
ec
if
ic
co
n
d
itio
n
s
wer
e
m
et,
th
e
p
ar
ticip
an
t
m
u
s
t
b
e
wo
r
k
in
g
in
t
h
e
s
o
f
t
war
e
in
d
u
s
tr
y
f
o
r
m
o
r
e
th
a
n
5
y
ea
r
s
.
Seco
n
d
ly
,
p
ar
ticip
a
n
ts
m
u
s
t
also
h
av
e
k
n
o
wled
g
e
o
f
d
if
f
e
r
en
t
ty
p
es
o
f
s
ec
u
r
ity
co
n
ce
p
ts
an
d
th
e
ir
ap
p
licatio
n
s
.
T
h
e
p
a
r
ticip
a
n
ts
m
u
s
t
also
h
av
e
k
n
o
wled
g
e
o
f
d
if
f
er
en
t
t
y
p
es
o
f
m
o
d
ellin
g
lan
g
u
ag
es
s
u
c
h
as
UM
L
,
B
PMN
an
d
o
th
er
s
.
T
h
e
s
u
r
v
ey
was
co
n
d
u
cte
d
to
s
elec
t
th
e
m
o
s
t
ap
p
r
o
p
r
iate
v
is
u
al
r
ep
r
esen
tatio
n
o
f
a
s
ec
u
r
ity
c
o
n
ce
p
t
b
ec
au
s
e
d
if
f
er
e
n
t
r
esear
ch
er
s
h
av
e
p
r
esen
ted
t
h
e
s
am
e
s
ec
u
r
ity
co
n
ce
p
t d
if
f
er
e
n
tly
.
A
s
am
p
le
q
u
esti
o
n
f
r
o
m
th
e
q
u
esti
o
n
n
air
e
is
s
h
o
wn
in
Fig
u
r
e
5
,
wh
er
e
th
e
r
esp
o
n
d
en
t
is
ask
ed
t
o
s
elec
t
th
e
m
o
s
t
ap
p
r
o
p
r
iate
s
y
m
b
o
l
s
f
o
r
th
e
co
n
ce
p
t
o
f
s
ess
io
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
2
9
1
1
-
2
9
2
7
2918
I
n
th
e
t
h
ir
d
s
tep
,
th
e
f
in
al
s
et
o
f
n
o
tatio
n
s
an
d
s
y
m
b
o
ls
wer
e
u
s
ed
to
g
en
er
ate
UM
L
s
ter
eo
t
y
p
es.
T
h
e
s
elec
ted
n
o
tatio
n
s
s
atis
f
y
m
o
s
t
o
f
th
e
s
ec
u
r
ity
r
e
q
u
ir
em
e
n
ts
o
f
s
ec
u
r
e
s
y
s
tem
wh
ich
a
r
e
d
is
cu
s
s
ed
in
th
e
p
r
ev
io
u
s
s
ec
tio
n
.
T
a
b
le
1
0
s
h
o
ws
th
e
m
a
p
p
in
g
o
f
h
o
w
s
elec
ted
n
o
tatio
n
s
ar
e
r
elate
d
t
o
s
ec
u
r
ity
c
o
n
ce
p
ts
,
b
aselin
e
r
eq
u
ir
em
e
n
ts
,
s
ec
u
r
ity
r
eq
u
ir
e
m
en
ts
an
d
h
o
w
th
ey
ca
n
b
e
tr
a
n
s
f
o
r
m
ed
in
to
s
ter
eo
ty
p
es
an
d
wh
e
r
e
th
ese
UM
L
s
ter
eo
ty
p
es c
an
b
e
ap
p
lied
.
(
a)
(
b
)
(
c)
(
d
)
Fig
u
r
e
4
.
Step
s
o
f
p
r
o
p
o
s
ed
a
p
p
r
o
ac
h
(
a)
s
tep
1
s
y
m
b
o
l/n
o
tatio
n
ex
tr
ac
tio
n
,
(
b
)
s
tep
2
b
est v
is
u
al
r
ep
r
esen
tatio
n
o
f
s
ec
u
r
ity
c
o
n
ce
p
t,
(
c)
s
tep
3
s
ec
u
r
ity
co
n
ce
p
t to
s
ter
eo
ty
p
es,
an
d
(
d
)
s
tep
4
ev
alu
atio
n
o
f
s
ec
u
r
ity
s
ter
eo
ty
p
es
Fig
u
r
e
5
.
Sam
p
le
q
u
esti
o
n
T
ab
le
10
.
Ma
p
p
in
g
o
f
s
ec
u
r
ity
co
n
ce
p
ts
,
s
ec
u
r
ity
r
eq
u
ir
em
e
n
ts
,
an
d
UM
L
s
ter
eo
ty
p
es
S
e
c
u
r
i
t
y
c
o
n
c
e
p
t
B
a
se
l
i
n
e
r
e
q
u
i
r
e
m
e
n
t
(
s)
S
t
e
r
e
o
t
y
p
e
A
p
p
l
i
e
s t
o
R
e
l
a
t
e
d
se
c
u
r
i
t
y
r
e
q
u
i
r
e
m
e
n
t
A
v
a
i
l
a
b
i
l
i
t
y
A
v
a
i
l
a
b
i
l
i
t
y
<
<
Av
a
i
l
a
b
i
l
i
t
y
>
>
C
o
m
p
o
n
e
n
t
s,
n
o
d
e
s
-
I
n
t
e
g
r
i
t
y
I
n
t
e
g
r
i
t
y
<
<
I
n
t
e
g
r
i
t
y
>
>
D
a
t
a
,
c
l
a
ss
e
s
S
e
c
r
e
c
y
a
n
d
i
n
t
e
g
r
i
t
y
A
c
c
e
ss
c
o
n
t
r
o
l
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
,
i
n
t
e
g
r
i
t
y
,
a
u
t
h
o
r
i
z
a
t
i
o
n
<
<
Ac
c
e
ssC
o
n
t
r
o
l
>
>
I
n
t
e
r
f
a
c
e
s
,
ser
v
i
c
e
s
R
o
l
e
b
a
se
d
a
c
c
e
ss
c
o
n
t
r
o
l
,
g
u
a
r
d
e
d
a
c
c
e
ss
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
<
<
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
>
>
D
a
t
a
,
c
l
a
ss
e
s
S
e
c
r
e
c
y
a
n
d
i
n
t
e
g
r
i
t
y
D
a
t
a
i
n
t
e
g
r
i
t
y
I
n
t
e
g
r
i
t
y
<
<
D
a
t
a
I
n
t
e
g
ri
t
y
>
>
D
a
t
a
,
c
l
a
ss
e
s,
a
t
t
r
i
b
u
t
e
s,
a
ss
o
c
i
a
t
i
o
n
s
S
e
c
r
e
c
y
a
n
d
i
n
t
e
g
r
i
t
y
N
o
n
-
r
e
p
u
d
i
a
t
i
o
n
A
c
c
o
u
n
t
a
b
i
l
i
t
y
(
i
n
t
e
g
r
i
t
y
)
<
<
N
o
n
R
e
p
u
d
i
a
t
i
o
n
>
>
Lo
g
s,
o
p
e
r
a
t
i
o
n
s
N
o
n
-
r
e
p
u
d
i
a
t
i
o
n
A
u
t
h
e
n
t
i
c
a
t
i
o
n
I
d
e
n
t
i
f
i
c
a
t
i
o
n
&
a
u
t
h
e
n
t
i
c
a
t
i
o
n
<
<
Au
t
h
e
n
t
i
c
a
t
i
o
n
>
>
S
e
r
v
i
c
e
s,
i
n
t
e
r
f
a
c
e
s
A
u
t
h
e
n
t
i
c
i
t
y
A
u
t
h
o
r
i
z
a
t
i
o
n
A
c
c
e
ss
c
o
n
t
r
o
l
(
c
o
n
f
i
d
e
n
t
i
a
l
i
t
y
)
<
<
Au
t
h
o
ri
z
a
t
i
o
n
>
>
M
e
t
h
o
d
s,
s
e
r
v
i
c
e
s
R
o
l
e
b
a
se
d
a
c
c
e
ss
c
o
n
t
r
o
l
,
g
u
a
r
d
e
d
a
c
c
e
ss
En
c
r
y
p
t
i
o
n
C
o
n
f
i
d
e
n
t
i
a
l
i
t
y
,
i
n
t
e
g
r
i
t
y
<
<
En
c
r
y
p
t
i
o
n
>
>
C
o
mm
u
n
i
c
a
t
i
o
n
l
i
n
k
s
S
e
c
u
r
e
c
o
mm
u
n
i
c
a
t
i
o
n
l
i
n
k
H
a
sh
i
n
g
I
n
t
e
g
r
i
t
y
<
<
H
a
sh
i
n
g
>
>
A
t
t
r
i
b
u
t
e
s
,
d
a
t
a
I
n
t
e
g
r
i
t
y
S
e
ssi
o
n
A
v
a
i
l
a
b
i
l
i
t
y
,
c
o
n
f
i
d
e
n
t
i
a
l
i
t
y
<
<
S
e
ss
i
o
n
>
>
C
o
m
p
o
n
e
n
t
s,
i
n
t
e
r
f
a
c
e
s
-
S
e
n
s
o
r
y
e
x
p
e
r
i
e
n
c
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
(
u
sa
b
i
l
i
t
y
&
b
i
o
me
t
r
i
c
s)
<
<
S
e
n
so
ryE
x
p
e
ri
e
n
c
e
>
>
A
c
t
o
r
s
,
d
e
v
i
c
e
s
-
UM
L
s
ter
eo
ty
p
es
p
r
o
p
o
s
ed
in
[
2
9
]
wer
e
u
s
ed
as
th
e
b
ase
cl
ass
an
d
n
ew
class
es
th
at
in
h
er
it
f
r
o
m
th
e
s
ter
eo
ty
p
e
‘
s
ec
u
r
ity
r
eq
u
ir
e
m
en
t
’
wer
e
p
r
o
p
o
s
e
d
.
Fig
u
r
e
6
s
h
o
ws
o
n
e
o
f
th
e
s
ter
eo
ty
p
es
p
r
o
p
o
s
ed
in
o
u
r
ap
p
r
o
ac
h
.
Du
e
to
th
e
lim
itati
o
n
o
f
s
p
ac
e
o
n
ly
s
ter
eo
ty
p
es
r
elate
d
to
au
th
en
ticatio
n
a
r
e
d
is
p
lay
ed
h
er
e.
T
h
e
s
ter
eo
ty
p
e
‘
au
th
en
ticatio
n
’
is
d
ef
in
ed
as
a
ch
ild
o
f
‘
s
ec
u
r
ity
r
e
q
u
i
r
e
m
e
n
t
’
.
T
h
e
s
ter
eo
ty
p
e
‘
au
th
en
ticatio
n
’
h
as
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
A
co
mp
a
r
is
o
n
o
f
a
p
p
r
o
a
ch
es
fo
r
mo
d
elin
g
s
o
ftw
a
r
e
s
ec
u
r
ity
…
(
S
ye
d
Mu
h
a
mma
d
J
u
n
a
i
d
Ha
s
s
a
n
)
2919
two
ch
ild
r
en
,
n
am
ely
‘
m
u
lti
-
f
ac
to
r
au
th
en
ticatio
n
’
a
n
d
‘
r
is
k
-
b
ased
au
th
en
ticatio
n
’
s
ter
eo
t
y
p
es.
T
h
e
f
ir
s
t
o
n
e
h
as y
et
an
o
th
e
r
in
h
er
ited
s
ter
eo
ty
p
e
n
a
m
ed
‘
two
-
f
ac
to
r
a
u
th
en
ticatio
n
’
.
Fig
u
r
e
6.
T
h
e
p
r
o
p
o
s
ed
s
t
e
r
e
o
ty
p
e
s
3
.
2
.
Sa
m
ple m
o
del f
o
r
risk
b
a
s
ed
a
uthent
ica
t
io
n
Ass
u
m
e
th
at
a
clien
t
ac
ce
s
s
e
s
an
o
n
lin
e
b
an
k
in
g
s
y
s
tem
u
s
in
g
d
if
f
e
r
en
t
ty
p
es
o
f
n
et
wo
r
k
s
an
d
d
ev
ices.
T
h
e
n
etwo
r
k
m
ay
b
e
a
p
u
b
lic
wir
eless
n
etwo
r
k
,
a
p
r
iv
ate
s
ec
u
r
e
n
etwo
r
k
,
o
r
a
m
o
b
ile
n
etwo
r
k
.
T
h
e
clien
t
m
ay
u
s
e
a
r
ec
o
g
n
ized
d
ev
ice
(
e.
g
.
,
th
e
u
s
er
’
s
lap
to
p
)
,
an
u
n
r
eg
is
ter
ed
p
u
b
lic
co
m
p
u
t
er
at
an
air
p
o
r
t,
o
r
a
m
o
b
ile
d
ev
ice
with
in
ter
n
et
ac
ce
s
s
.
T
h
e
o
n
lin
e
b
an
k
in
g
s
y
s
tem
u
s
es
th
e
r
is
k
p
r
o
f
ile
ass
o
ciate
d
with
th
e
ty
p
e
o
f
ac
ce
s
s
an
d
d
eter
m
in
es
th
e
lev
el
o
f
ch
allen
g
e
to
b
e
u
s
ed
wh
ile
au
th
en
ticatin
g
th
e
u
s
er
.
I
f
th
e
u
s
er
tr
ies
to
ac
ce
s
s
th
eir
o
n
lin
e
b
a
n
k
in
g
ac
co
u
n
t
f
r
o
m
a
n
u
n
r
ec
o
g
n
iz
ed
d
e
v
ice,
t
h
ey
m
ay
b
e
ask
ed
to
an
s
wer
m
o
r
e
q
u
esti
o
n
s
th
an
ju
s
t th
eir
u
s
er
I
D
an
d
p
ass
wo
r
d
.
T
h
is
s
ce
n
ar
io
h
as b
ee
n
d
ep
icted
in
Fig
u
r
e
7
.
Fig
u
r
e
7.
R
is
k
b
ased
a
u
t
h
e
n
t
i
ca
t
i
o
n
Fig
u
r
e
8.
Mu
lti
f
ac
to
r
a
u
t
h
e
n
t
i
c
a
t
i
o
n
3
.
3
.
Sa
m
ple m
o
del f
o
r
m
ulti
-
f
a
ct
o
r
a
uthent
ica
t
io
n
Mu
lti
-
f
ac
to
r
au
th
en
ticatio
n
u
s
es
m
o
r
e
th
an
two
f
ac
to
r
s
f
o
r
au
th
en
ticatio
n
.
Usu
ally
,
th
ese
f
ac
to
r
s
in
clu
d
e
wh
at
y
o
u
k
n
o
w
(
e.
g
.
,
u
s
er
n
am
e/p
ass
wo
r
d
o
r
PIN
)
,
wh
at
y
o
u
h
av
e
(
e.
g
.
,
a
n
AT
M
ca
r
d
,
OT
P
d
ev
ice
o
r
a
s
m
ar
t
ca
r
d
)
,
an
d
f
in
ally
,
w
h
at
y
o
u
ar
e
(
e.
g
.
,
f
in
g
e
r
p
r
in
t
,
r
etin
a
s
ca
n
o
r
f
ac
ial
r
ec
o
g
n
it
io
n
)
.
B
y
co
m
b
i
n
in
g
m
u
ltip
le
f
o
r
m
s
o
f
au
th
e
n
ticatio
n
,
m
u
lti
-
f
ac
to
r
au
th
e
n
ticatio
n
s
ig
n
if
ican
tly
e
n
h
an
ce
s
s
ec
u
r
ity
,
m
a
k
in
g
it
m
u
c
h
h
ar
d
er
f
o
r
u
n
au
th
o
r
ized
in
d
iv
i
d
u
als
to
ac
ce
s
s
s
en
s
itiv
e
in
f
o
r
m
atio
n
,
ev
en
if
th
ey
h
av
e
o
b
ta
in
ed
a
p
ass
wo
r
d
.
I
t
is
wid
ely
u
s
ed
to
p
r
o
tect
o
n
lin
e
ac
co
u
n
ts
,
co
r
p
o
r
ate
s
y
s
tem
s
,
an
d
s
en
s
itiv
e
d
ata
f
r
o
m
cy
b
er
th
r
ea
ts
.
T
o
d
em
o
n
s
tr
ate
th
e
u
s
e
o
f
th
e
p
r
o
p
o
s
ed
m
u
lti
-
f
ac
to
r
au
th
e
n
ticatio
n
s
y
s
tem
,
let
’
s
ass
u
m
e
a
u
s
er
o
f
a
cr
itical
co
n
tr
o
l
s
y
s
tem
.
W
h
en
t
h
e
u
s
er
wan
ts
to
lo
g
on
to
th
e
s
y
s
tem
,
th
ey
u
s
e
th
eir
s
m
ar
t
ca
r
d
as
th
e
f
ir
s
t
s
tep
o
f
th
e
au
th
en
ticatio
n
p
r
o
ce
s
s
,
an
d
later
th
ey
a
r
e
ask
ed
to
en
ter
th
eir
p
ass
wo
r
d
.
T
h
e
s
ce
n
ar
i
o
h
as
b
ee
n
d
e
p
icted
in
Fig
u
r
e
8
.
T
h
e
clien
t
m
o
d
u
le
p
r
o
v
id
es
s
m
ar
t
ca
r
d
in
f
o
r
m
atio
n
to
th
e
au
th
e
n
ticatio
n
m
o
d
u
le
.
Up
o
n
s
u
cc
ess
,
th
e
m
u
lti
-
f
ac
to
r
au
th
en
ticatio
n
m
o
d
u
le
f
u
r
th
er
r
eq
u
ests
th
e
clien
t
to
s
en
d
th
eir
u
s
er
n
am
e
an
d
p
ass
wo
r
d
to
co
m
p
lete
th
e
au
th
en
ticatio
n
p
r
o
ce
s
s
.
Similar
ly
,
th
e
s
ter
eo
ty
p
es
f
o
r
o
th
er
s
ec
u
r
ity
c
o
n
ce
p
ts
wer
e
cr
ea
ted
.
Fin
ally
,
in
th
e
f
o
u
r
t
h
s
tep
,
th
e
UM
L
s
ter
eo
ty
p
es
wer
e
test
ed
with
th
e
h
elp
o
f
h
u
m
an
s
u
b
je
ct
ev
alu
atio
n
wh
er
e
h
u
m
an
s
u
b
jects
wer
e
g
iv
e
n
a
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
3
,
J
u
n
e
20
25
:
2
9
1
1
-
2
9
2
7
2920
s
ce
n
ar
io
to
r
ep
r
esen
t
g
r
ap
h
ica
lly
.
T
h
e
s
ce
n
ar
io
p
r
esen
ted
to
h
u
m
an
s
u
b
jects
was
cu
r
ated
b
y
s
ec
u
r
ity
ex
p
er
ts
.
C
er
tain
s
ec
u
r
ity
co
n
ce
p
ts
we
r
e
in
clu
d
e
d
in
th
e
s
ce
n
ar
io
s
o
th
at
UM
L
s
ter
eo
ty
p
es
ca
n
b
e
test
ed
.
E
ith
e
r
s
ter
eo
ty
p
e
n
am
e
o
r
s
y
m
b
o
l
o
r
b
o
th
ca
n
b
e
u
s
ed
to
r
ep
r
esen
t
th
e
s
ec
u
r
ity
r
eq
u
i
r
em
en
t.
I
n
t
h
e
f
ir
s
t
attem
p
t
t
h
e
r
esp
o
n
d
en
ts
wer
e
n
o
t
ex
p
o
s
e
d
to
UM
L
s
ter
eo
ty
p
es
with
s
ec
u
r
ity
s
y
m
b
o
ls
,
af
ter
th
e
f
ir
s
t
attem
p
t
th
ey
wer
e
p
r
o
v
id
e
d
with
th
e
UM
L
s
ter
eo
ty
p
es
with
s
ec
u
r
ity
s
y
m
b
o
ls
.
At
th
e
e
n
d
,
r
esp
o
n
d
en
ts
wer
e
r
eq
u
ested
to
f
ill
a
q
u
esti
o
n
n
air
e
r
e
g
ar
d
i
n
g
u
s
ab
il
ity
an
d
u
s
ef
u
ln
ess
o
f
p
r
o
p
o
s
ed
UM
L
s
ter
eo
ty
p
es.
4.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
T
o
an
aly
ze
s
ec
u
r
ity
s
y
m
b
o
ls
t
o
b
e
u
s
ed
in
p
r
o
p
o
s
ed
s
ter
eo
t
y
p
es
a
s
u
r
v
ey
was
co
n
d
u
cted
o
n
Am
az
o
n
m
ec
h
an
ical
T
u
r
k
.
T
h
e
p
u
r
p
o
s
e
o
f
th
is
s
u
r
v
e
y
was
to
r
ed
u
c
e
th
e
n
u
m
b
e
r
o
f
s
y
m
b
o
ls
av
ai
lab
le
to
b
e
u
s
ed
in
UM
L
s
ter
eo
ty
p
es
as
m
an
y
r
esear
ch
er
s
u
s
ed
d
if
f
er
en
t
s
y
m
b
o
ls
/n
o
tatio
n
s
to
r
ep
r
esen
t
th
e
s
am
e
s
ec
u
r
ity
co
n
ce
p
t.
T
h
is
s
u
r
v
ey
r
esu
lted
in
a
f
in
al
s
et
o
f
1
2
s
ec
u
r
ity
s
y
m
b
o
ls
/n
o
tatio
n
s
v
is
ib
le
in
Fig
u
r
e
9
,
wh
ich
wer
e
th
en
co
n
v
er
ted
i
n
s
ter
eo
ty
p
es
an
d
in
c
o
r
p
o
r
ated
in
Mic
r
o
s
o
f
t
Vis
io
s
ten
cil
an
d
Dr
aw.
io
l
ib
r
ar
y
s
o
t
h
at
th
ey
m
ay
b
e
u
s
ed
in
th
e
f
o
u
r
t
h
s
tep
o
f
th
e
s
tu
d
y
.
Fig
u
r
e
9
.
F
i
n
a
l
s
e
t
o
f
s
e
c
u
r
i
t
y
s
y
m
b
o
l
s
a
n
d
n
o
t
a
t
i
o
n
s
I
n
th
e
f
o
u
r
t
h
s
tep
,
th
e
lib
r
ar
y
an
d
s
ten
cil
o
f
UM
L
s
ter
eo
ty
p
es
co
m
b
in
ed
with
s
ec
u
r
ity
n
o
tatio
n
s
an
d
s
y
m
b
o
ls
wer
e
s
h
ar
ed
with
th
e
h
u
m
an
s
u
b
jects.
T
h
e
y
wer
e
ask
ed
to
d
r
aw
d
ia
g
r
am
s
with
s
ec
u
r
ity
s
y
m
b
o
ls
an
d
n
o
tatio
n
s
an
d
with
o
u
t
s
ec
u
r
it
y
s
y
m
b
o
ls
an
d
n
o
tatio
n
s
.
T
h
e
p
r
im
ar
y
o
b
jectiv
e
was
to
ev
alu
ate
h
o
w
well
d
if
f
er
en
t
s
ec
u
r
ity
n
o
tatio
n
s
wer
e
u
n
d
er
s
to
o
d
a
n
d
im
p
le
m
en
ted
b
y
s
o
f
twar
e
d
ev
el
o
p
er
s
an
d
d
esig
n
er
s
.
R
esp
o
n
s
es
wer
e
co
n
v
en
tio
n
al
d
iag
r
a
m
s
th
at
i
n
co
r
p
o
r
ate
s
ec
u
r
ity
s
y
m
b
o
ls
.
T
h
ey
p
r
o
v
id
e
v
alu
a
b
le
in
s
ig
h
ts
in
to
h
o
w
th
e
s
ec
u
r
ity
r
eq
u
i
r
e
m
en
ts
ca
n
b
e
m
o
d
elled
b
y
ex
ten
d
in
g
UM
L
th
r
o
u
g
h
s
ter
eo
t
y
p
es.
Mo
r
eo
v
e
r
,
th
e
s
u
r
v
ey
co
n
d
u
cted
at
th
e
en
d
also
p
r
esen
ted
v
alu
ab
le
r
esu
lts
in
ter
m
s
o
f
u
s
ab
ilit
y
o
f
th
ese
p
r
o
p
o
s
ed
s
ter
eo
ty
p
es.
Fig
u
r
es
1
0
to
1
5
ar
e
d
is
p
lay
in
g
th
e
ty
p
ical
s
ce
n
ar
io
e
n
co
u
n
ter
ed
wh
ile
tr
y
i
n
g
to
ac
ce
s
s
a
b
an
k
ac
co
u
n
t
an
d
p
er
f
o
r
m
a
tr
an
s
a
ctio
n
th
e
d
escr
ip
tio
n
o
f
wh
ic
h
is
as
f
o
llo
ws.
T
h
e
b
an
k
wan
ts
to
f
ac
ilit
ate
it
s
cu
s
to
m
er
s
to
p
er
f
o
r
m
f
in
an
cia
l
tr
an
s
ac
tio
n
s
2
4
/7
u
b
iq
u
ito
u
s
ly
.
W
h
en
T
h
e
cu
s
to
m
er
o
p
en
s
th
e
b
an
k
’
s
web
s
ite,
th
e
cu
s
to
m
er
will
b
e
p
r
o
v
id
e
d
with
s
af
ety
in
f
o
r
m
atio
n
a
b
o
u
t
th
e
ac
co
u
n
t
a
n
d
h
o
w
to
u
s
e
it
in
a
p
o
p
u
p
win
d
o
w.
T
h
e
cu
s
to
m
er
is
th
en
r
eq
u
ir
ed
to
e
n
ter
a
u
s
er
n
am
e
an
d
to
p
r
o
v
id
e
p
r
o
o
f
th
at
th
e
cu
s
to
m
er
is
h
u
m
an
an
d
n
o
t
a
m
ac
h
in
e
b
y
en
ter
i
n
g
ch
ar
ac
te
r
s
an
d
f
ig
u
r
es/n
u
m
b
er
s
th
at
ap
p
ea
r
in
th
e
f
o
r
m
o
f
an
im
ag
e.
Af
ter
s
u
cc
ess
f
u
l
v
er
if
icatio
n
,
th
e
cu
s
to
m
er
is
g
r
an
ted
ac
ce
s
s
to
th
e
n
ex
t
p
ag
e
wh
e
r
e
p
ass
wo
r
d
is
r
e
q
u
ir
ed
.
Acc
o
r
d
in
g
to
th
e
b
an
k
’
s
s
ec
u
r
ity
p
o
licy
cu
s
to
m
er
ar
e
n
ev
e
r
ask
ed
to
en
ter
a
co
m
p
lete
p
ass
wo
r
d
b
u
t
o
n
ly
a
p
ar
t
o
f
it.
Af
ter
s
u
cc
ess
f
u
l
v
er
if
icatio
n
,
lo
g
in
p
r
o
ce
s
s
is
co
m
p
lete
as
s
h
o
wn
in
Fig
u
r
e
1
0
an
d
Fig
u
r
e
1
1
,
ac
ce
s
s
in
g
b
an
k
ac
co
u
n
t w
ith
/
with
o
u
t secu
r
ity
s
y
m
b
o
l r
esp
e
ctiv
ely
.
Af
ter
lo
g
in
,
th
e
cu
s
to
m
er
is
g
r
an
ted
ac
ce
s
s
to
a
b
an
k
ac
c
o
u
n
t
wh
er
e
d
if
f
er
en
t
tr
an
s
ac
ti
o
n
s
ca
n
b
e
p
er
f
o
r
m
ed
.
I
f
th
e
cu
s
to
m
e
r
r
e
m
ain
s
ac
tiv
e
f
o
r
m
o
r
e
th
a
n
5
m
in
u
tes,
th
e
cu
s
to
m
er
will b
e
au
to
m
atica
lly
lo
g
g
e
d
o
f
f
f
r
o
m
th
e
b
an
k
’
s
web
s
ite.
W
h
en
th
e
cu
s
to
m
e
r
in
itiates
a
f
in
an
cial
tr
an
s
ac
tio
n
,
s
ay
f
o
r
e
x
am
p
le
a
tr
an
s
f
er
o
f
f
u
n
d
s
to
s
o
m
e
o
n
e’
s
ac
co
u
n
t,
a
v
er
if
icatio
n
is
ag
ain
r
e
q
u
ir
ed
th
at
it
is
th
e
cu
s
to
m
er
wh
o
h
as
in
itiated
th
e
tr
an
s
ac
tio
n
b
y
p
r
o
v
id
in
g
a
o
n
e
-
tim
e
au
th
o
r
izatio
n
co
d
e
wh
i
ch
is
s
en
t
eith
e
r
t
o
cu
s
to
m
e
r
’
s
em
ail
ad
d
r
ess
o
r
m
o
b
ile
n
u
m
b
e
r
.
A
f
ter
s
u
cc
es
s
f
u
l
v
er
if
icatio
n
,
t
h
e
tr
a
n
s
ac
tio
n
is
c
o
m
p
leted
an
d
th
e
cu
s
to
m
er
is
n
o
tifie
d
.
C
u
s
to
m
er
s
ca
n
p
er
f
o
r
m
o
th
er
tr
an
s
ac
tio
n
s
also
,
f
o
r
e
x
am
p
le
p
ay
in
g
u
tili
ty
b
ills
.
Dif
f
e
r
en
t
r
esp
o
n
s
es
with
s
ec
u
r
ity
s
y
m
b
o
ls
ar
e
s
h
o
wn
in
Fig
u
r
e
1
3
an
d
1
5
an
d
with
o
u
t
s
ec
u
r
ity
s
y
m
b
o
ls
f
o
r
ac
ce
s
s
in
g
b
an
k
ac
c
o
u
n
t
ar
e
s
h
o
wn
in
Fig
u
r
e
1
2
a
n
d
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.