Identifying and Implementing Security Patterns for a Dependable Security Case -- From Security Patterns to D-Case | IEEE Conference Publication | IEEE Xplore