We introduce a theoretical framework for discovering relationships between two database instances over distinct and unknown schemata. This framework is grounded in the context of ...
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
To fully leverage the information from different data sources and applications, an enterprise needs a generic, interoperable and flexible infrastructure to integrate and coordinate...
Jingtao Zhou, Shusheng Zhang, Han Zhao, Mingwei Wa...
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
The HCI subsystem is an essential component of an Information System, whose success inside an organization strongly depend on user acceptance. A good UI design considering usabili...
Nicola Aloia, Cesare Concordia, Maria Teresa Parat...