Security modelling using hierarchical state machines | IEEE Conference Publication | IEEE Xplore