Security modeling in the Ulysses environment | IEEE Conference Publication | IEEE Xplore