related documents Engineering topology aware adaptive security: Preventing requirements violations at runtime Conferences