Applying a theory of modules and interfaces to security verification | IEEE Conference Publication | IEEE Xplore