Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model | IEEE Conference Publication | IEEE Xplore