How to make Discretionary Access Control secure against trojan horses | IEEE Conference Publication | IEEE Xplore