The Satchel system architecture: Mobile access to documents and services

Mobile professionals require access to documents and document‐related services, such as printing, wherever they may be. They may also wish to give documents to colleagues electronically, as easily as with paper, face‐to‐face, and with similar security characteristics. The Satchel system provides such capabilities in the form of a mobile browser, implemented on a device that professional people would be likely to carry anyway, such as a pager or mobile phone. Printing may be performed on any Satchel‐enabled printer, or any fax machine. Scanning, too, may be accomplished at any Satchel‐enabled scanner. Access rights to individual documents may be safely distributed, without regard to document formats. Access to document services is greatly simplified by the use of context sensitivity. The system has been extensively tested and evaluated. This paper describes the architecture of the Satchel system.

[1]  Marvin Theimer,et al.  The Case for Non-transparent Replication: Examples from Bayou , 1998, IEEE Data Eng. Bull..

[2]  Hui Lei,et al.  Intelligent file hoarding for mobile computers , 1995, MobiCom '95.

[3]  Julie McKeehan,et al.  Programming for the Newton using Macintosh (2nd ed.) , 1996 .

[4]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[5]  M. Lamming,et al.  "Forget-me-not" Intimate Computing in Support of Human Memory , 1994 .

[6]  Rohit Khare W* effect considered harmful [Internet WAP] , 1999 .

[7]  T. Dierks,et al.  The TLS protocol , 1999 .

[8]  A. Ramanujapuram,et al.  DIGITAL CONTENT& INTELLECTUAL PROPERTY RIGHTS , 1998 .

[9]  Joyce K. Reynolds,et al.  Executive Introduction to Directory Services Using the X.500 Protocol , 1992, RFC.

[10]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[11]  Lawrence C. Stewart,et al.  An Extension to HTTP : Digest Access Authentication , 1997, RFC.

[12]  Nathaniel S. Borenstein,et al.  MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.

[13]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[14]  Margery Eldridge,et al.  Satchel: providing access to any document, any time, anywhere , 2000, TCHI.

[15]  Tim Berners-Lee,et al.  Uniform Resource Locators (URL) , 1994, RFC.

[16]  Aline Baggio,et al.  Mobile host tracking and resource discovery , 1996, EW 7.