Browsing: Evaluating Security Requirements