From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach