Keyholes: selective sharing in close collaboration
暂无分享,去创建一个
[1] Jasna Kuljis,et al. Is usable security an oxymoron? , 2006, INTR.
[2] Diana K. Smetters,et al. Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.
[3] J. Wong. Marmite: Towards End-User Programming for the Web , 2007 .
[4] Jonathan Trevor,et al. Anchored conversations: chatting in the context of a document , 2000, CHI.
[5] Neal Stephenson. In the Beginning... Was the Command Line , 1999 .
[6] Michel Beaudouin-Lafon,et al. Computer supported co-operative work , 1999 .
[7] Diana K. Smetters,et al. User experiences with sharing and access control , 2006, CHI EA '06.
[8] Martin Wattenberg,et al. E-mail research: targeting the enterprise , 2005 .