Transforming Security Requirements into Architecture | IEEE Conference Publication | IEEE Xplore