Constraint-based Analysis of Security Properties door Sarna-Starosta Beata