Using transition traces to model a security protocol