: In this article we explain how we apply the CIAM methodology based on the CIAN notation in order to generate user interfaces in collaborative applications. CIAM has been applied ...
Maximiliano Paredes, Ana I. Molina, Miguel A. Redo...
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
As Java is the preferred platform for the deployment of network computers, it is appealing to run multiple applications on a single Java desktop. We experimented with using the Ja...
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...