Identification of IT security-relevant system characteristics | IEEE Conference Publication | IEEE Xplore