Authorization constraint enforcement for information system security | IEEE Conference Publication | IEEE Xplore