5.5 Model-Based Analysis and Security