Design methods for Security and Trust | IEEE Conference Publication | IEEE Xplore