Elaborating security requirements by construction of intentional anti-models | IEEE Conference Publication | IEEE Xplore