A formal methodology for detection of vulnerabilities in an enterprise information system | IEEE Conference Publication | IEEE Xplore