S-links: Why distributed security policy requires secure introduction

   Abstract