469076.fig.003
Figure 3: Threat model of the working people application scenario.