Managing security requirements patterns using feature diagram hierarchies | IEEE Conference Publication | IEEE Xplore