Fig. 3From: Use Case methodology: a progress reportSecurity concept and SGAM for ISMSBack to article page