A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
—The adoption of portable wireless devices is rapidly rising. The demand for efficient communication protocols amongst these devices is pressing. In this paper, we present a con...