Agree to Disagree: Security Requirements are Different, but Mechanisms for Security Adaptation are Not | IEEE Conference Publication | IEEE Xplore