For cloud services on a user's multiple devices, how do we measure the trusted zone defended by anti-malware? | IEEE Conference Publication | IEEE Xplore