Research Article
An Authentication-Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL
| Security constraints | Description |
| Sc1 | The card number must be valid | Sc2 | The account must be verified | Sc3 | The PIN must be valid | Sc4 | The attempts for PIN must be less than 4 | Sc5 | The fingerprint must be matched |
|
|