Security requirement with a UML 2.0 profile | IEEE Conference Publication | IEEE Xplore