Security model

For PDF version of this document, visit Security Model .