Customizing Security Policies For Data-Centric Program Domains With Multi-Tenant Threat Models