Protection of information in computer systems | IEEE Journals & Magazine | IEEE Xplore