[Impressum]
[E-Mail]
Modeling Age Verification (2)
The
next step is to describe the data types and messages with UML class
diagrams and the communication structure and attacker capabilities with
an UML deployment diagram.
- Classes with the stereotype <<Terminal>>, <<Smartcard>> or <<User>>
describe components. This components have some attributes and use
messages to interact with each other. Messages are classes that are
derived from a class with the stereotype <<Message>>.

- The attacker capabilities are described in the deployment diagram by the stereotype <<Threat>>
Since the attacker can read all messages, send arbitrary messages, and
suppress messages from the terminal or the card, we have a Dolev-Yao
attacker model. The User models a human that interacts with a terminal,
and we are not really interested in "attacks'' against a real person.

Back, Next Step: Detailed model with activity diagrams