Within the HCI community, there is a growing interest in how technology is used and appropriated outside the workplace. In this paper, we present preliminary findings of how large...
Susan Wyche, Yevgeniy Eugene Medynskiy, Rebecca E....
This paper presents a new schema-sharing technique for multitenant applications. Our approach is built on top of the Extension table method and makes use of the native XML data su...
Franclin S. Foping, Ioannis M. Dokas, John Feehan,...
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...