We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
This paper uses a long term ethnographic study of the design and implementation of an electronic patient records (EPR) system in a UK hospital Trust to consider issues arising in ...
David Martin, Mark Rouncefield, Jacki O'Neill, Mar...
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
This work presents several approaches for designing the memory management component of self stabilizing operating systems. We state the requirements which a memory manager should ...