Each security constraint consists of: