A comparison of trusted X security policies, architectures, and interoperability | IEEE Conference Publication | IEEE Xplore