I. Introduction
Assurance case in safety domain has been studied extensively for years, but the application of assurance case technology to security has been explored far less thoroughly [1], [2]. Although researches on software security case have made some progress [3]–[10], there has been a limited use of security case so far, partly because that the details of argument construction strategy are not clear enough and the corresponding security case patterns are not adequate.