Research Article

An Authentication-Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL

Figure 17

Weaving security model and constraints.