By Topic

IEEE Internet Computing

Issue 6 • Date Nov/Dec 1998

Filter Results

Displaying Results 1 - 9 of 9
  • Cognitive agents

    Publication Year: 1998, Page(s):87 - 89
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Several researchers have proposed using cognitive concepts as a semantic basis for agent communications (M.N. Huhns and M.P. Singh, 1997). One of the leading candidates for such a semantics is based on Arcol, the communication language used within Artimis. Interestingly, this application (not only of Arcol, but also in general) appears extremely misguided. The intentional concepts are well suited ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Burnt offerings [Internet]

    Publication Year: 1998, Page(s):84 - 86
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    We can learn much from what we name our technology. The author's latest theory goes something like this: never give new technology a cute name. That's it. Despite volumes of evidence proving we should make computers more user friendly, he still believes there's a zone you don't cross into, and that is cuteness. So if you happen to invent a new technology, be it hardware or software, then name it s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Web scripting

    Publication Year: 1998, Page(s):46 - 55
    Cited by:  Papers (4)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Current Web scripting languages lack an explicit security model. The model proposed in the article has been implemented for JavaScript in the Mozilla browser source code; it is realized by a “safe” interpreter and based on three basic building blocks: access control, to regulate what data a script can access on a user's machine and in what mode; independence of contexts, to ensure that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative technologies for evolving software systems

    Publication Year: 1998, Page(s):79 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The article discusses four major collaboration theme areas: collaborative information engineering; collaborative process and workflow; collaboration support (awareness); and integration of collaborative systems. Various projects incorporating these technologies are outlined. All of the projects described are developing component technologies intended for mixing and matching with each other and wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing systems against external programs

    Publication Year: 1998, Page(s):35 - 45
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Internet users routinely and often unknowingly download and run programs, such as Java applets; and some Web servers let users upload external programs and run them on the server. Although the practice of executing these external programs has the sanction of widespread use, its security implications haven't yet been systematically addressed. In the brief, dynamic history of the Internet, such a si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AGORA: a search engine for software components

    Publication Year: 1998
    Cited by:  Papers (26)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Using JavaBeans and CORBA agents in conjunction with Web search technologies, this prototype search engine (Agora), automatically generates and indexes a worldwide database of software products, classified by component model. Users of Agora can search for components in this database by describing specific properties of a component's interface. The system combines Web search engines with an introsp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile code security

    Publication Year: 1998, Page(s):30 - 34
    Cited by:  Papers (25)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Sandboxes, code signing, firewalls, and proof carrying code are all techniques that address the inherent security risks of mobile code. The article summarizes the relative merits of each. It is concluded that each of these techniques offers something different, and the best approach is probably a combination of security mechanisms. The sandbox and code signing approaches are already being hybridiz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Java class loading

    Publication Year: 1998, Page(s):56 - 61
    Cited by:  Papers (10)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    The class loading mechanism, central to Java, plays a key role in JDK 1.2 by enabling an improved security policy that is permission-based and extensible. The author concludes that JDK 1.2 has introduced a powerful and secure class loading mechanism. It not only enforces type safety and name space separation but also has a significant role in the new security architecture that supports fine graine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP routers: new tool for gigabit networking

    Publication Year: 1998, Page(s):14 - 18
    Cited by:  Papers (9)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    IP routing continues to receive much attention from the research and vendor communities. Its primary function-forwarding packets between networks-must keep pace with the demands of the exponentially growing end user population. It must accommodate attachment of gigabit data link technologies such as ATM, packet Sonet, Gigabit Ethernet, and dense wave division multiplexing, and fill those links at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami