Information security: from reference monitors to wrappers | IEEE Conference Publication | IEEE Xplore