Implementing security policies using the Safe Areas of Computation approach | IEEE Conference Publication | IEEE Xplore