Using abuse case models for security requirements analysis | IEEE Conference Publication | IEEE Xplore