By Topic

Internet Computing, IEEE

Issue 6 • Date Nov.-Dec. 2002

Filter Results

Displaying Results 1 - 16 of 16
  • U.S. plans office to fight internet censorship

    Publication Year: 2002 , Page(s): 8 - 9
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IETF: revisiting principles

    Publication Year: 2002 , Page(s): 9 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest editor's introduction - the technology of trust

    Publication Year: 2002 , Page(s): 28 - 29
    Save to Project icon | Request Permissions | PDF file iconPDF (540 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Special thanks to IC's reviewers

    Publication Year: 2002 , Page(s): 84 - 85
    Save to Project icon | Request Permissions | PDF file iconPDF (191 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2002 , Page(s): 86 - 89
    Save to Project icon | Request Permissions | PDF file iconPDF (433 KB)  
    Freely Available from IEEE
  • Subject index

    Publication Year: 2002 , Page(s): 89 - 95
    Save to Project icon | Request Permissions | PDF file iconPDF (565 KB)  
    Freely Available from IEEE
  • Network forensics analysis

    Publication Year: 2002 , Page(s): 60 - 66
    Cited by:  Papers (19)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (470 KB)  

    Many tools let you view traffic in real time, but real-time monitoring at any level requires significant human and hardware resources, and doesn't scale to networks larger than a single workgroup. It is generally more practical to archive all traffic and analyze subsets as necessary. This process is known as reconstructive traffic analysis, or network forensics. In practice, it is often limited to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Open Grid Services Architecture: where the grid meets the Web

    Publication Year: 2002 , Page(s): 67 - 71
    Cited by:  Papers (21)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (273 KB)  

    Recently, the Globus Project and IBM initiated a development effort to align Grid technologies with Web services technologies, using the Open Grid Services Architecture. OGSA enables the integration of services and resources across distributed, heterogeneous, dynamic environments and communities. To achieve this integration, the OGSA model adopts the Web Services Description Language (WSDL) and de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing secure Web applications

    Publication Year: 2002 , Page(s): 38 - 45
    Cited by:  Papers (13)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (699 KB)  

    The Secure Web Applications Project (SWAP) is an interdisciplinary research initiative between the Laboratory for Communications Engineering and the Computer Laboratory of the University of Cambridge that seeks to address the problem of application-level Web security at a higher level. The project reduces application development time and protects against a large class of application-level attacks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS issues in Web services

    Publication Year: 2002 , Page(s): 72 - 75
    Cited by:  Papers (256)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB)  

    Quality of service (QoS) is a combination of several qualities or properties of a service, such as: availability is the percentage of time that a service is operating; security properties include the existence and type of authentication mechanisms the service offers, confidentiality and data integrity of messages exchanged, nonrepudiation of requests or messages, and resilience to denial-of-servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making agents secure on the semantic Web

    Publication Year: 2002 , Page(s): 76 - 79
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (285 KB)  

    Agents were designed to collaborate and share information. While highly desirable for interoperability, this feature is scary from the security perspective. Illegal inferences, supported by semantic Web technology and ontologies, might enable users to access unauthorized information. In addition to semantic associations and replicated data with different sensitivity, malicious agents could also ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building trustworthy software agents

    Publication Year: 2002 , Page(s): 46 - 53
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (569 KB)  

    As agents become more active and sophisticated, the implications of their actions become more serious. With today's GUIs, user and software errors can often be easily fixed or undone. An agent performing actions on behalf of a user could make errors that are very difficult to "undo", and, depending on the agent's complexity, it might not be clear what went wrong. Moreover, for agents to operate ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Negotiating trust in the Web

    Publication Year: 2002 , Page(s): 30 - 37
    Cited by:  Papers (72)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (466 KB)  

    Our system, TrustBuilder, supports automated trust negotiation between strangers on the Internet. TrustBuilder lets negotiating parties disclose relevant digital credentials and access control policies and establish the trust necessary to complete their interaction. TrustBuilder is intended for use in any situation where two entities from different security domains need to establish trust - busine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster Web page allocation with neural networks

    Publication Year: 2002 , Page(s): 18 - 26
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (418 KB)  

    To maintain quality of service, some heavily trafficked Web sites use multiple servers, which share information through a shared file system or data space. The Andrews file system (AFS) and distributed file system (DFS), for example, can facilitate this sharing. In other sites, each server might have its own independent file system. Although scheduling algorithms for traditional distributed system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chain of responsibility

    Publication Year: 2002 , Page(s): 80 - 83
    Cited by:  Papers (6)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (304 KB)  

    Among the design patterns that recur most often in middleware, such as Wrapper-Facade and Strategy, the author's favorite is the Chain of Responsibility pattern. In object-oriented terms, the CoR pattern aims to decouple a caller from its target object, and it accomplishes this by interposing a chain of objects between them. This arrangement lets each object in the chain act on a request as it flo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jena: a semantic Web toolkit

    Publication Year: 2002 , Page(s): 55 - 59
    Cited by:  Papers (92)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (289 KB)  

    HP Labs developed the Jena toolkit to make it easier to develop applications that use the semantic Web information model and languages. Jena is a Java application programming interface that is available as an open-source download from www.hpl.hp.com/semweb/jena-top.html. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami