A Methodology for Conversion of Enterprise-Level Information Security Policies to Implementation-Level Policies/Rule | IEEE Conference Publication | IEEE Xplore