The trustworthy computing security development lifecycle | IEEE Conference Publication | IEEE Xplore