Protecting documents with sticky policies and identity-based encryption | IEEE Conference Publication | IEEE Xplore