Representing Security Goals, Policies, and Objects | IEEE Conference Publication | IEEE Xplore