Modeling Security and Privacy Requirements: a Use Case-Driven Approach | doi.page