Security models for trusting network appliances | IEEE Conference Publication | IEEE Xplore