Security architectures using formal methods | IEEE Journals & Magazine | IEEE Xplore