Research Article

An Authentication-Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL

Table 2

Security constraints.

Security constraintsDescription

Sc1The card number must be valid
Sc2The account must be verified
Sc3The PIN must be valid
Sc4The attempts for PIN must be less than 4
Sc5The fingerprint must be matched