Using security policies in a network securing process | IEEE Conference Publication | IEEE Xplore