security-model

See the following sections: