Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

IEEE Internet Computing

Issue 6 • Nov.-Dec. 2003

Filter Results

Displaying Results 1 - 17 of 17
  • Analysis of liberty single-sign-on with enabled clients

    Publication Year: 2003, Page(s):38 - 44
    Cited by:  Papers (31)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    Web single-sign-on protocols-such as Microsoft passport, Oasis's security assertion markup language (SAML), and the Internet2 project Shibboleth, aim to solve security problems by letting individuals log in to many Internet services while authenticating only once, or at least always in the same way. Enterprises hope that single-sign-on protocols will significantly decrease customer-care costs due ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing multiple and dependable identities

    Publication Year: 2003, Page(s):29 - 37
    Cited by:  Papers (21)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB)

    Digital management of multiple robust identities is a crucial issue in developing the next generation of distributed applications. Our daily activities increasingly rely on remote resources and services - specifically, on interactions between different, remotely located parties. Because these parties might (and sometimes should) know little about each other, digital identities - electronic represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The sentient Web

    Publication Year: 2003, Page(s):82 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB)

    In a startling revelation, a team of university scientists has reported that a network of computers has become conscious and sentient, and is beginning to assume control of online information system. In spite of the ominous tone typically chosen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. An agent is an active, persistent software component that per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication and its privacy effects

    Publication Year: 2003, Page(s):54 - 58
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB)

    As communications and computer technologies ingrain themselves further into our lives, we're asked to authenticate ourselves in a variety of ways, using increasingly sophisticated authentication systems. Most of this authentication requires personal information, which raises many privacy concerns. The US National Academies' Committee on Authentication Technologies and Their Privacy Implications re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-level QoS control for video-on-demand

    Publication Year: 2003, Page(s):16 - 24
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    User requirements and device heterogeneity call for Web services with differentiated quality of service (QoS). In particular, services with response-time constraints, such as video-on-demand (VoD), require the differentiation, control, and dynamic adaptation of QoS. Service providers and network operators need methodologies and mechanisms for managing runtime QoS. Using mobile agent technology, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web server software architectures

    Publication Year: 2003, Page(s):78 - 81
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB)

    Web site scalability depends on several things - workload characteristics, security mechanisms, Web cluster architectures as we discussed previously. Another important item that can affect a site's performance and scalability is the Web server software architecture. We provide a classification of Web server architectures, offer a quantitative analysis of some possible software architectural option... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven trust negotiation for Web services

    Publication Year: 2003, Page(s):45 - 52
    Cited by:  Papers (37)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB)

    Trust negotiation is an approach to access control whereby access is granted based on trust established in a negotiation between the service requester and the service provider. Trust negotiation systems avoid several problems facing traditional access control models such as DAC (discretionary access control) and MAC (mandatory access control). Another problem is that Web service providers often do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services are not distributed objects

    Publication Year: 2003, Page(s):59 - 66
    Cited by:  Papers (78)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB)

    Web services are frequently described as the latest incarnation of distributed object technology. This misconception, perpetuated by people from both industry and academia, seriously limits broader acceptance of the true Web services architecture. Although the architects of many distributed and Internet systems have been vocal about the differences between Web services and distributed objects, dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is the Internet going NUTSS?

    Publication Year: 2003, Page(s):94 - 96
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB)

    For nearly 10 years now, the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF) have been telling us that the pool of available IP addresses will soon be exhausted, and that Internet growth will come to a grinding halt. They have heavily promoted their solution, IPv6, which the commercial world has all but ignored. It is now becoming clear that IP address exhaustion is ye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content delivery networks: status and trends

    Publication Year: 2003, Page(s):68 - 74
    Cited by:  Papers (141)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB)

    CDNs improve network performance and offer fast and reliable applications and services by distributing content to cache servers located close to users. The Web's growth has transformed communications and business services such that speed, accuracy, and availability of network-delivered content has become absolutely critical - both on their own terms and in terms of measuring Web performance. Proxy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New acceleration technologies might not be fool's gold

    Publication Year: 2003, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Has VoIP arrived?

    Publication Year: 2003, Page(s):10 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity management

    Publication Year: 2003, Page(s):26 - 28
    Cited by:  Papers (6)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration with Web services

    Publication Year: 2003, Page(s):75 - 77
    Cited by:  Papers (44)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    There's a difference between what we'd like our enterprise computing systems to be and what they really are. We like to envision them as orderly multitier arrangements comprising software buses, hubs, gateways, and adapters - all deployed at just the right places to maximize scale, load, application utility, and ultimately, business value. Unfortunately, we know that there's a wide gulf between th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special thanks to IC's reviewers

    Publication Year: 2003, Page(s):86 - 87
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s):88 - 91
    Request permission for commercial reuse | PDF file iconPDF (492 KB)
    Freely Available from IEEE
  • Subject index

    Publication Year: 2003, Page(s):91 - 93
    Request permission for commercial reuse | PDF file iconPDF (416 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami