Instantiating a model for structuring and reusing security requirements sources | IEEE Conference Publication | IEEE Xplore