Protecting security information in distributed systems | IEEE Conference Publication | IEEE Xplore