Implementing security policy in a large defence procurement | IEEE Conference Publication | IEEE Xplore