“…We can find in the literature much research in the area of web services security, both regarding security requirements analysis (Firesmith, 2003;Firesmith, 2004;Gutiérrez et al, 2005b;OASIS, 2005;W3C, 2004;WS-I, 2005;Yagüe et al, 2005;Yagüe and Troya, 2002) and concerning the definition of security patterns (Alexander et al, 1977;Buschmann, 1999;Buschmann et al, 1996;Fernandez, 2002;Fernandez and Pan, 2001;Fernandez et al, 2003;Lehtoren and Pärssinen, 2002;Ramachandran, 2002;Rosado et al, 2006;Steel et al, 2005;Yoder and Barcalow, 1997). However, there are no approaches connecting security requirements with security patterns, so there are no traceability mechanisms allowing choosing the most appropriate security pattern depending on a specific security requirement.…”