Reasoning about Concurrency for Security Tunnels | IEEE Conference Publication | IEEE Xplore