Managing the Security Wall of Data | IEEE Journals & Magazine | IEEE Xplore