Verifying Opacity Properties in Security Systems | IEEE Journals & Magazine | IEEE Xplore