[Impressum] [E-Mail]

Modeling Age Verification (2)

The next step is to describe the data types and messages with UML class diagrams and the communication structure and attacker capabilities with an UML deployment diagram.
       


       

Back, Next Step: Detailed model with activity diagrams