Assessment of security requirements for sensitive systems | IEEE Conference Publication | IEEE Xplore