On the use of trusted objects to enforce isolation between processes and data | IEEE Conference Publication | IEEE Xplore