By Topic

Computer

Issue 10 • Date Oct. 2001

Filter Results

Displaying Results 1 - 15 of 15
  • Tempest over web-authoring tools

    Publication Year: 2001, Page(s):12 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded security: challenges and concerns

    Publication Year: 2001, Page(s):40 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (91 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why are we doing this?

    Publication Year: 2001, Page(s):116 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The profession's future lies in its past

    Publication Year: 2001, Page(s):120 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shifting paradigms with the application service provider model

    Publication Year: 2001, Page(s):32 - 39
    Cited by:  Papers (13)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Built upon developments in selective outsourcing, application hosting and browser-based computing, the application service provider (ASP) model shifts the purchase of computing power from a product to a rented-service form. If it can overcome the challenges facing it, the ASP model will foster a new generation of distributed, component-based computing services characterized by finer computing gran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making home automation communications secure

    Publication Year: 2001, Page(s):50 - 56
    Cited by:  Papers (21)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    New communications technology offers numerous benefits, but it also opens home automation to many security threats. To protect against these threats within the limited resources of a typical home automation system, we have developed a family of products based on Honeywell's Global Home Server (GHS), a remote Web site that provides secure Internet access and other services to client installations. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenges that XML faces

    Publication Year: 2001, Page(s):15 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Proponents have promoted XML as a revolutionary replacement for HTML that will add semantics to Web technology; let users, devices and applications on different platforms communicate across the Internet; and permit organizations to integrate different data types within their systems. Indeed, organizations have developed many XML-based applications, including the Chemical Markup Language, Commerce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search engines as a security threat

    Publication Year: 2001, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Because they implement vulnerable security policies, search engines are excellent tools for helping hackers to attack machines anonymously, search for easy targets or gather confidential data. Securing all channels against hackers trying to penetrate a vulnerable system isn't possible, but there is no reason for search engines to be wide-open channels that continue to help hackers find and penetra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copy protection technology is doomed

    Publication Year: 2001, Page(s):48 - 49
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    Those determined to bypass copy-protection technologies have always found ways to do so - and always will. A copyright holder's best protection lies in creating an attractive business model. The only way to prevent teenage girls from freely sharing boy-band MP3s will be to provide a reasonably priced service that's irresistibly better than free file sharing. Some vendors are beginning to offer fla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting digital content within the home

    Publication Year: 2001, Page(s):42 - 47
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Home users are increasingly using compact discs, DVD, digital cable, direct broadcast satellites and the Internet to digitally access, store and display music, movies and other entertainment content. Traditionally an intellectual-property gray area, home use presents digital content protection challenges that a combination of technology and licensing hopes to overcome View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beacon signals: what, why, how, and where?

    Publication Year: 2001, Page(s):108 - 110
    Cited by:  Papers (8)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    Beacons are primarily radio, ultrasonic, optical, laser or other types of signals that indicate the proximity or location of a device or its readiness to perform a task. Beacon signals also carry several critical, constantly changing parameters, such as power-supply information, relative address, location, timestamp, signal strength, available bandwidth resources, temperature and pressure. Althoug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting usability through software architecture

    Publication Year: 2001, Page(s):113 - 115
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Software engineers should consider usability as a quality attribute in their architectural a designs. Usability determines how effectively and comfortably an end-user can achieve the goals that gave rise to an interactive system. It is an important attribute to consider during all phases of software design, but especially during architectural design because of the expense involved in adding usabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • API-level attacks on embedded systems

    Publication Year: 2001, Page(s):67 - 75
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    We have recently discovered a whole new family of attacks on the APIs (application programming interfaces) used by security processors. These attacks are economically important, as security processors are used to support a wide range of services - from ATMs (automated teller machines) to pre-payment utility metering - but designing APIs that resist such attacks is difficult View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online games: crafting persistent-state worlds

    Publication Year: 2001, Page(s):111 - 112
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Ultima Online created a new type of computer game, one that models a persistent-state world. Unlike traditional games, Ultima Online's game world, or state, persists indefinitely. Once developers make a persistent-state world live, they never turn it off. People from across the globe connect to these games and play out their favorite fantasies, assured that their monthly subscription fees will pay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building the IBM 4758 secure coprocessor

    Publication Year: 2001, Page(s):57 - 66
    Cited by:  Papers (55)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    Meeting the challenge of building a user-configurable secure coprocessor provided several lessons in hardware and software development and continues to spur further research. In developing the 4758, we met our major research security goals and provided the following features: (1) a lifetime-secure tamper-responding device, rather than one that is secure only between resets that deployment-specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com