Return to Article Details A Framework based on Security Patterns for Transformations Download Download PDF