Inheriting Software Security Policies within Hardware IP Components | IEEE Conference Publication | IEEE Xplore