Applying the composition principle to verify a hierarchy of security servers | IEEE Conference Publication | IEEE Xplore