Computer

Issue 9 • Sept. 1998

Filter Results

Displaying Results 1 - 10 of 10
  • A survey of Web security

    Publication Year: 1998, Page(s):34 - 41
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB)

    Developing security methods for the Web is a daunting task, in part because security concerns arose after the fact. Today, with an internationally connected user network and rapidly expanding Web functionality, reliability and security are critical. Vendors engaged in retrofitting security must contend with the Web environment's peculiarities, which include location irrelevance, statelessness, cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Architectures for Learning [Standards]

    Publication Year: 1998, Page(s):105 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm-agile encryption in ATM networks

    Publication Year: 1998, Page(s):57 - 64
    Cited by:  Papers (8)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    ATM encryption allows users to select an appropriate algorithm to implement security services for a given transmission. This flexibility is especially helpful when the choices for encryption algorithms between transmission points are limited. Algorithm flexibility also helps reduce operational costs, since multiple algorithms-which are typically implemented in several encryptors-can all be impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for virtual private intranets

    Publication Year: 1998, Page(s):48 - 55
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    As telecommuting grows, businesses must consider security when extending their network environment to employees' homes. Researchers at the University of Pennsylvania have addressed the problem with smart cards, operating system modifications, and network authentication. We note the distinction between trust and integrity: trust is determined through the verification of components and the dependenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographic design vulnerabilities

    Publication Year: 1998, Page(s):29 - 33
    Cited by:  Papers (44)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending your house not by building a fence around it, but by putting an immense stake in the ground and hoping that your adversary runs right into it. Counterpane Systems has spent years designing, analyzing, and breaking crypt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security at the Internet layer

    Publication Year: 1998, Page(s):43 - 47
    Cited by:  Papers (20)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    The Internet Engineering Task Force is standardizing security protocols (IPsec protocols) that are compatible with IPv6 and can be retrofitted into IPv4. The protocols are transparent to both applications and users and can be implemented without modifying application programs. The current protocol versions were published as Internet drafts in March 1998. The article overviews the proposed security... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Education on the Web: a rejoinder

    Publication Year: 1998, Page(s):107 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    It is an error to over generalize from early Web based education to current standards of practice. The state of the art for distance learning projects is based on the use of Web-centric integrated distributed learning environments (IDLEs). Incorporating the application of sound principles of learning/education and appropriate instructional design, IDLEs support extremely high quality, student cent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security: it's time to take it seriously

    Publication Year: 1998, Page(s):24 - 28
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    “Network security is the most important thing on the planet”. We have heard these words uttered with great conviction many times. However, the first time it causes any inconvenience to system owners, administrators, or users, the same people hasten to add “except when it impacts performance, system complexity, or cost”. Let's face it. Security is usually discarded when it c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronous C++: a language for interactive applications

    Publication Year: 1998, Page(s):65 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Synchronous C++ defines active objects that contain their own execution threads and can communicate with each other by means of synchronizing method calls. The author shows how to model programs in sC++ and compares sC++ with event driven programming. He focuses on examples in which the dynamic and functional models dominate and the object model is secondary. In doing so, he proposes a mapping bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The advent of “green” computer design

    Publication Year: 1998, Page(s):16 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Computer manufacturing and consumption are becoming a significant environmental concern. Some fundamental changes are beginning to take place in the computer industry. These changes aren't about MIPS or megabytes. They're about manufacturers in the computer industry beginning to look for ways to reduce the resources they consume and the waste they generate, and for ways to make their products more... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org