How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper) | IEEE Conference Publication | IEEE Xplore