Executable misuse cases for modeling security concerns | IEEE Conference Publication | IEEE Xplore