Analysing security requirements patterns based on problems decomposition and composition | IEEE Conference Publication | IEEE Xplore