Maintaining consistency of the security policy using timestamp ordering | IEEE Conference Publication | IEEE Xplore