A Role-Oriented Access Control Model, p.113 ,
Emre Harmanc? Mobile Security Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices, p.189 ,
Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for, p.208 ,