Leveraging information security and computational trust for cybersecurity | Publicación