Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines | IEEE Conference Publication | IEEE Xplore