To really make it harder for adversaries to access user qualifications, supplemental qualifications need to be used. To model a more complicated scenario during which an adversary combines these two techniques, Asset one and Asset 3 are indirectly associated, along with the attack methods and defenses for both of these https://ieeexplore.ieee.org/document/9941250