By Topic

IEEE Internet Computing

Issue 6 • Date Nov.-Dec. 2005

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1562 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1120 KB)
    Freely Available from IEEE
  • Internet computing

    Publication Year: 2005, Page(s):4 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    The practical handbook of Internet computing attempts to define the space of Internet computing. The author tries to better define what Internet computing encompasses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will GENI be a magic lamp or a dim bulb?

    Publication Year: 2005, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    According to the NSF, the GENI initiative will support the research, design, and development of new networking and distributed systems capabilities by: creating new core functionality, going beyond the existing paradigms of datagram, packet, and circuit switching and designing new network-management paradigms and naming, addressing, and identity architectures; developing enhanced capabilities- bui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From the Newsstand

    Publication Year: 2005, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Review of Internet-related stories in IEEE, Computer Society, and trade press. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Ad Hoc and P2P Security

    Publication Year: 2005, Page(s):14 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    In this special issue, we present important topics for computer security in ad hoc and P2P areas that lead to future development and deployment of efficient and powerful networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architectural approach for decentralized trust management

    Publication Year: 2005, Page(s):16 - 23
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    To guard against malicious peers, peer-to-peer applications must incorporate suitable trust mechanisms. Current decentralized trust-management research focuses mainly on producing trust models and algorithms, whereas the actual composition of trust models into real applications has been largely unexplored. The practical architectural approach for composing egocentric trust (Pace) provides detailed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted P2P transactions with fuzzy reputation aggregation

    Publication Year: 2005, Page(s):24 - 34
    Cited by:  Papers (201)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other. The authors present a new P2P reputation system based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in peer trust reports. This system aggregates peer reputations with affordable message overhead. By testing t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dempster-Shafer theory for intrusion detection in ad hoc networks

    Publication Year: 2005, Page(s):35 - 41
    Cited by:  Papers (47)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion detection among their nodes. But even though a distributed intrusion-detection system can combine data from multiple nodes to estimate the likelihood of an intrusion, the observing nodes-might not be reliable. The Dempster-Shafer theory of evidence is well suited for this type of problem because it reflects u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing data authenticity and integrity in P2P systems

    Publication Year: 2005, Page(s):42 - 49
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Peer-to-peer systems let users share information in distributed environments because of their scalability and efficiency. However, existing P2P systems are vulnerable to numerous security attacks and lack a mechanism to ensure shared information's authenticity and integrity. A proposed general architecture enhances these aspects by leveraging trusted computing technology, which is built on a trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel methodology for constructing secure multipath overlays

    Publication Year: 2005, Page(s):50 - 57
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    One technique for securely delivering data in structured overlays is to increase the number of disjoint paths among peers. However, most overlays do not offer a substrate to accommodate multiple paths. The binary-equivalence relationship-based Cyclone methodology is decoupled from the overlay architecture, which insulates it from such limitations. It fortifies existing routing algorithms to defend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services management: a survey

    Publication Year: 2005, Page(s):58 - 64
    Cited by:  Papers (25)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Solutions based on service-oriented architectures are promising in that they leverage common services and enable collaborative business processes that cross organizational boundaries. However, because Web services applications can span multiple hosts, operating systems, languages, and enterprises, it's problematic to measure, control, and manage application availability and performance. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research directions for service-oriented multiagent systems

    Publication Year: 2005, Page(s):65 - 70
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Today's service-oriented systems realize many ideas from the research conducted a decade or so ago in multiagent systems. Because these two fields are so deeply connected, further advances in multiagent systems could feed into tomorrow's successful service-oriented computing approaches. This article describes a 15-year roadmap for service-oriented multiagent system research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Old measures for new services

    Publication Year: 2005, Page(s):72 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Like fashions and music, computing styles tend to come and go. For example, structured techniques let us measure software quality based on coupling and cohesion concepts that are equally applicable to today's service-oriented systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Talk to your semantic Web

    Publication Year: 2005, Page(s):75 - 78
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    Using natural language to communicate with computers remains a grand-challenge question. The authors LingoLogic interface technology can be seen as a widely useful human interface technology that can extend the semantic Web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Annual Index

    Publication Year: 2005, Page(s):80 - 85
    Request permission for commercial reuse | PDF file iconPDF (632 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking the semantic Web. Part I

    Publication Year: 2005, Page(s):88, 86 - 87
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    The semantic Web is a compelling vision, in which the World Wide Web will include a notion of meaning in data and services. Intelligent agents will exchange information and rules for how to interact with that information, with or without human intervention; appointments will be automatically scheduled; and automated agents will select and invoke services. Information will be easy to find without d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami