Extracting and Analyzing the Implemented Security Architecture of Business Applications | IEEE Conference Publication | IEEE Xplore