Identifying Security Spots for Data Integrity | IEEE Conference Publication | IEEE Xplore