Security from the transparent computing aspect | IEEE Conference Publication | IEEE Xplore