Constraint-based Analysis of Security Properties by Sarna-Starosta Beata