Text this: A fuzzy-based technique for describing security requirements of intrusion tolerant systems