C. Yu-yuan and R. B. Lee, Hardware-Assisted Application-Level Access Control, ISC 2009, pp.363-378, 2009.

J. Peja?, T. Hyla, and J. Kry?ski, ORCON access control monitored by the initiator: theoretical and practical implementation method, National conference on Cybercrime and Information Security, p.2012

B. Ho?yst and J. Pomyka?a, Cybercrime, information security and cryptology, Prosecution and Law, p.2011

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2002.
DOI : 10.1109/MSECP.2003.1176998

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

G. R. Blakley, Safeguarding cryptographic keys, AFIPS, pp.313-317, 1979.

J. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, CRYPTO '88: Proceedings on Advances in cryptology, pp.27-35, 1990.
DOI : 10.1007/0-387-34799-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.698.1352

T. Tassa, Hierarchical Threshold Secret Sharing, Journal of Cryptology, vol.20, issue.2, pp.237-264, 2007.
DOI : 10.1007/s00145-006-0334-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.2022

B. Nakielski and J. Pomyka?a, Simple dynamic threshold decryption based on CRT and RSA, Journal of Telecommunications and Information Technology, vol.2, pp.70-73, 2009.

. Fortinet-'s-fortiguard and . Labs, Reveals Newest of mobile Malware Trends in Latest Threat Report

I. Fray, Method of determining the trust in the information system based on the process of assessing and treating risk, monograph Informatics, 2013.

I. Fray, About Some Application of Risk Analysis and Evaluation, Kluwer International Series in Engineering and Computer Science, vol.752, pp.283-292, 2003.
DOI : 10.1007/978-1-4419-9226-0_27