Reinforcing IoT-Enforced Security Policies | IEEE Conference Publication | IEEE Xplore