In this section
Auxiliary security models
Base security model
Regex security model
HashSet security model
StaticMap security model
Flow security model
Mic security model