A security model to protect sensitive information flows based on trusted computing technologies | IEEE Conference Publication | IEEE Xplore