M. Dell-'amico, G. Serme, M. Sabir-idrees, A. Santana-de-olivera, Y. Roudier et al., A Role-Oriented Access Control Model, p.113

F. Karakoç, H. Demirci, and A. , Emre Harmanc? Mobile Security Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices, p.189

K. Android and .. , Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for, p.208