Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications | IEEE Conference Publication | IEEE Xplore