Security Requirements Of Applications Research Articles