Merging security policies: analysis of a practical example | IEEE Conference Publication | IEEE Xplore