Requirements for security in cooperative work: two case studies