% Authors : Barbara Kordy (barbara.kordy@uni.lu)
%           Patrick Schweitzer (patrick.schweitzer@uni.lu)
% Date : 25/06/2012
% (c) 2012 University of Luxembourg - Interdisciplinary Centre for Security 
% Reliability and Trust (SnT)
% All rights reserved

\documentclass{article}

\usepackage{ADT_web}
\usepackage[labelformat=empty]{caption}
\pagestyle{empty}

%------------------------------------------------------------------------------
\begin{document}

\begin{figure}[htb]
\setlength{\pbs}{1.50cm}
\centering
\psset{treesep=0.5cm}
\psscalebox{0.557}{%
%\psscalebox{0.73}{%
\pstree[levelsep=60pt,treesep=0.4cm]{\NNodeB{Data1}{Data\\Confiden-\\tiality}}{
  \pstree{\NNodeB{Data2}{Network\\Security}}{
  \pstree{\NNodeB{Network2}{Access\\Control}}{
    \pstree{\NodeB{Passwords}}{
      \pstree{\NodeAC{Dictionary\\Attack}}{
        \pstree{\NodeBC{Strong\\Passwords}}{
          \pstree{\NodeAC{Strong\\Password\\Attacks}}{
            \NodeA{Find\\Note}
            \NodeA{Same\\Password,\\Different\\Account}
          }
        }
      }
    }
  }
  \NodeB{Firewalls}
  \NNodeB{Network3}{IDS}}
  \pstree{\NNodeB{Data 3}{Physical\\Security}}{
    \pstree{\NodeAC{Break\\In}}{
      \pstree{\NodeA{Back\\Door}}{
        \pstree{\NodeBC{Lock}}{
          \pstree{\NodeAC{Defeat\\Lock}}{
            \NodeA{Force\\Open}
            \NodeA{Acquire\\Keys}
          }
        }
      }
      \pstree{\NodeA{Fire\\Escape}}{
        \pstree{\NodeA{Door}}{
          \pstree{\NodeBC{Lock}}{
            \pstree{\NodeAC{Defeat\\Lock}}{
              \NodeA{Force\\Open}
              \NodeA{Acquire\\Keys}
            }
          }
        }
        \pstree{\NodeA{Window}}{
          \NodeBC{Reinforce}
        }
      }
      \pstree{\NodeA{Window}}{
        \NodeBC{Reinforce}
      }
      \pstree{\NodeBC{Security\\Guard}}{
        \pstree{\NodeAC{Defeat\\Guard}}{
          \NodeA{Bribe}
          \pstree{\NNodeA{OV}{Overpower}}{
            \NNodeA{OV2}{Out-\\number}
            \NNodeA{OV3}{Use\\Weapons}
          }
          \NodeA{Steal\\Keys}
          \NodeBC{Video\\Cameras}
        }
      }
    }
  }
  \pstree{\NodeAC{Employee\\Attack}}{
    \pstree{\NodeA{Corruption}}{
      \NodeBC{Screening}
    }
    \pstree{\NodeA{Social\\Enginee-\\ring}}{
      \NodeBC{Sensitivity\\Training}
    }
  }
}

\Arclhsa{1.5cm}{Data1}{Data2}{Data3}
\Bogen{Data2}{Network2}{Network3}
\Bogen{OV}{OV2}{OV3}


%Legend
\rput(-2.0,1){
  \begin{tabular}{|cl|}
  \hline
  \hspace{1ex}$\ACC$ & attack node\\
  \hspace{1ex}$\DCC$ & defense node\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    & disjunctive refinement\\
  \hspace{2ex}\psline[linewidth=0.5pt](0,.3)(-.3,0)
    \psline[linewidth=0.5pt](0,.3)(-.1,0)
    \psline[linewidth=0.5pt](0,.3)(.1,0)
    \psarc[linewidth=0.5pt](0,.3){0.2cm}{225}{288}
    & conjunctive refinement\\
  \hspace{1ex}\psline[linewidth=2pt,linestyle=dotted](0,.2)(0,-.2)
    & countermeasure\\[0.13cm]
  \hline
  \end{tabular}
  }
}
\caption{How to protect data confidentiality?}
\label{fig:main}
\end{figure}

\end{document}