Secure information flow using security groups | IEEE Conference Publication | IEEE Xplore