Providing a flexible security override for trusted systems | IEEE Conference Publication | IEEE Xplore