Modeling security requirements through ownership, permission and delegation | IEEE Conference Publication | IEEE Xplore