Using the Common Criteria to Elicit Security Requirements with Use Cases | IEEE Conference Publication | IEEE Xplore