Cart (Loading....) | Create Account
Close category search window

A software infrastructure for authenticated Web metering

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Blundo, C. ; Dept. of Inf. & Applications, Salerno Univ., Italy ; Cimato, S.

As the popularity of the Internet and the number of resources available on it have grown, potential customers are increasingly turning to it for information about products and services. Accordingly, online advertising is gaining a significant portion of the advertising market. The Internet has become a mainstream advertising channel, surpassing traditional media such as newspapers and radio in number of advertisements. Advertisers exploit the popularity of the best-known Web sites, typically search engines or portals, to advertise their products and reach the most potential customers. Traditional rating systems are of little value when applied to the Internet because of the enormous number of Web pages available to online advertisements. Counting accesses to a Web service is a difficult task and the data may be unreliable. Several metering techniques attempt to accurately measure the number of visits a site receives and hence the advertising exposure, but advertisers and auditing companies haven't adopted a standard technique. We propose a framework based on hash chains. Unlike similar approaches, our implementation minimizes the overhead associated with the additional communication required to implement the protocol while providing an efficient and flexible scheme. Furthermore, the resulting framework offers additional guarantees such as security and nonrepudiation of the produced proof of visits.

Published in:

Computer  (Volume:37 ,  Issue: 4 )

Date of Publication:

April 2004

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.