https://1library.net/document/yd2dvllq-selecting-security-patterns-that-fulfill-security-requirements.html