Using the decision support algorithms combining different security policies | IEEE Conference Publication | IEEE Xplore