Characterizations and boundaries of security requirements patterns | IEEE Conference Publication | IEEE Xplore