Legend
Sequence Diagram
Operation 1
Data
Operation 2
Data
Operation 3
Some data
Other data
Threats