Enforcing secure service composition | IEEE Conference Publication | IEEE Xplore