From Secure Business Process Modeling to Design-Level Security Verification | IEEE Conference Publication | IEEE Xplore