On Role Mappings for RBAC-Based Secure Interoperation | IEEE Conference Publication | IEEE Xplore