Building a secure, location transparent object invocation system | IEEE Conference Publication | IEEE Xplore