Narrowing the Gap Between Tees Threat Model and Deployment Strategies | IEEE Conference Publication | IEEE Xplore