% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage{rotating}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{sidewaysfigure}[htb]
\centering
\psscalebox{0.6}{
\pstree[levelsep=100pt,treesep=0.4cm]{\NNodeA{Root}{Auction\\Fraud}}{
\pstree{\NNodeA{Child1}{Prepa-\\ration\\Phase}}{
\pstree{\NNodeA{Prep1}{Ask Vera\\about Sam}}{\NodeBC{Subvert\\Verify}}
\pstree{\NNodeA{Child2}{Shop at\\Sam's}}{
  \NNodeA{Sam1}{Acquire\\Malware}
  \NodeA{Acquire\\Emails}
  \NNodeA{Sam3}{Acquire\\Chris' CC}
  \NodeBC{Police\\Internet}
  }
\pstree{\NNodeA{Child3}{Send\\Emails}}{
  \pstree{\NNodeA{Emails1}{Job\\Offer}}{
    \pstree{\NNodeA{Job1}{Rachel\\Accepts Job}}{\NodeBC{Train\\Rachel}}
    \NNodeA{Job2}{Send Job\\Ad to\\Emails}
    }
  \pstree{\NNodeA{Emails2}{Malware\\Distri-\\bution}}{
    \pstree{\NNodeA{Malware1}{Tina Opens\\Attachment}}{\NodeBC{Train\\Tina}}
    \NNodeA{Malware2}{Send\\Malware to\\Emails}
    }
  }
}
\pstree{\NNodeA{Child4}{Buy\\from Alice}}{
  \pstree{\NNodeA{Alice1}{Credentials\\from Tina}}{
    \NodeBC{Profile\\Credential\\Usage}}
  \NodeA{Purchase\\Goods}
  \pstree{\NNodeA{Alice2}{Pay with\\Chris' CC}}{\NodeBC{Check CCs\\for Theft}}
  }
\pstree{\NNodeA{Child5}{Delivery\\Process}}{
  \pstree{\NNodeA{Delivery1}{Max to\\Rachel}}{\NodeBC{Mark\\Goods}}
  \pstree{\NodeA{Rachel to\\Dave}}{
    \pstree{\NodeBC{Stop in\\Transit}}{
      \NodeB{Mark\\Goods}
      \NodeB{Spot-check\\Drop\\Boxes}
      }
    }
  \pstree{\NNodeA{Delivery3}{Otto 
from\\Dave}}{\NodeBC{Spot-check\\Drop\\Boxes}}
  }
\pstree{\NNodeA{Child6}{Otto sells\\to Perry}}{
  \pstree{\NodeBC{Prevent\\Sale}}{
    \NodeB{Police\\Pawn\\Brokers}
    \NodeB{Revenue\\Checks}
    }
  }
}
\Bogen{Root}{Child1}{Child6}
\Bogen{Child2}{Sam1}{Sam3}
\Bogen{Child1}{Prep1}{Child3}
\Bogen{Child3}{Emails1}{Emails2}
\Bogen{Child4}{Alice1}{Alice2}
\Bogen{Child5}{Delivery1}{Delivery3}
\Bogen{Emails1}{Job1}{Job2}
\Bogen{Emails2}{Malware1}{Malware2}

%Legend
\rput(-2,0){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=1pt,linestyle=dotted](0,.25)(0,-.05)
    & countermeasure\\
  \hline
  \end{tabular}
  }
}
\caption{An online auction fraud scenario.}
\label{fig:ADT_auction}
\end{sidewaysfigure}

\end{document}