Identification and evaluation of the security requirements in medical applications | IEEE Conference Publication | IEEE Xplore