Towards protecting sensitive files in a compromised system | IEEE Conference Publication | IEEE Xplore