Figure 5From: Heterogeneous resource federation with a centralized security model for information extraction Security components. Back to article page