Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms | IEEE Conference Publication | IEEE Xplore