Extrapolating security requirements to an established software process: Version 1.0 | IEEE Conference Publication | IEEE Xplore