On requirements and security in a CCIS | IEEE Conference Publication | IEEE Xplore