Tools for information security assurance arguments | IEEE Conference Publication | IEEE Xplore