By Topic

IEEE Internet Computing

Issue 2 • Date March-April 2008

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1452 KB)
    Freely Available from IEEE
  • 2008-2009 Editorial Calendar

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (980 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (334 KB)
    Freely Available from IEEE
  • Not-so-Secret Identities

    Publication Year: 2008, Page(s):4 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    The author relates stories about security and identity issues and how they relate to the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redefining the Server as Home Networks Emerge

    Publication Year: 2008, Page(s):7 - 9
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Forrester Research, issued a US market forecast for home servers with a more than 10-fold increase between 2007 and 2012, from 400,000 to 4.5 million units. However, Gownder says that the industry will have to state the case for more efficient storage and retrieval of home networks to the vast bulk of potential customers, even those who run home-based data-dependent businesses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Organizations [Guest Editors' Introduction]

    Publication Year: 2008, Page(s):10 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Today's organizations are no longer constrained by traditional time and place barriers. Instead, information technology supports virtual organizations: flexible networks of independent, globally distributed entities that share knowledge and resources and work toward a common goal. Resources aren't limited to computing power, but include elements as diverse as storage, network links, data sets, ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the Gap between Legal and Technical Contracts

    Publication Year: 2008, Page(s):13 - 19
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Two or more parties typically establish a business relationship using a contract, but a large gap still exists between the provisions of contracts produced by lawyers and the details of computer security and performance addressed by technologists. Some contractual clauses address legal issues that technology can manage as well - the TrustCoM framework offers a paradigm for automating these clauses... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Organization Support within a Grid-Wide Operating System

    Publication Year: 2008, Page(s):20 - 28
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    Despite grids' popularity, virtual organizations (VOs) have yet to become a commodity technology in modern computing environments due to the complexity of managing them and difficulty of assuring user and VO isolation. Here, the authors describe the VO management approach taken by XtreemOS, a new grid operating system with native support for VOs that supports a wide range of computing resources, f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provisioning for Dynamic Instantiation of Community Services

    Publication Year: 2008, Page(s):29 - 36
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    On-demand provisioning can allow collaborative communities to rapidly deploy the services required to support collaboration, without the need to acquire and operate dedicated hardware. To meet community needs for on- demand access while also maximizing global availability and runtime efficiency, the authors propose service-, container-, node-, and VO-level provisioning approaches based on a highly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE Computer Society membership [advertisement]

    Publication Year: 2008, Page(s): 37
    Request permission for commercial reuse | PDF file iconPDF (410 KB)
    Freely Available from IEEE
  • Policy Mapper: Administering Location-Based Access-Control Policies

    Publication Year: 2008, Page(s):38 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    Simplifying the administration of location-based access-control policies requires a mechanism that supports both intuitive and scalable spatial constraint specifications and a flexible enforcement architecture. Policy mapper is an administrative tool that helps define access control at conceptual and logical levels to carry out constraint specification and enforcement. The tool also provides an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Events into Cross-Organizational Business Processes

    Publication Year: 2008, Page(s):46 - 53
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Because Web-scale processes are inherently cross-organizational, they require the robust enactment of interactions among autonomous parties. However, specifying the processes involved is difficult. To overcome this obstacle, the authors use a business protocol that lets the applicable events and responses vary based on where the process is deployed and the infrastructure and IT applications instal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Ontology Support for E-Commerce

    Publication Year: 2008, Page(s):54 - 61
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    Privacy is becoming increasingly important due to the advent of e-commerce. E-commerce applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and regulations. Here, the authors define a privacy ontology to support the provision of privacy and help derive the level of privacy associated with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries

    Publication Year: 2008, Page(s):62 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1788 KB) | HTML iconHTML

    As in many regions of the world, people in rural India often lack access to knowledge that's more readily available to people in urban areas. Although rural telecenters are becoming more common, developing content that's presented in local languages, relevant to users, and delivered in an immediately usable form is a challenge here and in rural areas across the globe. To address this, an agricultu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast to Broadband: Unlicensed Access to Unused TV Channels?

    Publication Year: 2008, Page(s):71 - 75
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Although much public attention has focused on the US digital TV transition- and the resulting reallocation of analog TV channels by auction to wireless carriers - the US Federal Communications Commission will decide how to reallocate an even larger swath of prime TV band spectrum this year: the unused "white space" between occupied DTV channels. This reallocation of unused spectrum from broadcasti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards

    Publication Year: 2008, Page(s):76 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The World Wide Web Consortium (W3C) promulgates the HTML standards used on the Web, but it has no authority to enforce the adoption of one standard in favor of another. In this environment, developers have some incentive to ignore up-to-date W3C standards given that the transitional versions of HTML 4.01 and XHTML 1.0 offer most of the capabilities of the newer ones but are less stringent in their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traveling the Semantic Web through Space, Time, and Theme

    Publication Year: 2008, Page(s):81 - 86
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (879 KB) | HTML iconHTML

    In this installment of Semantics and Services, we further develop the idea of spatial, temporal, and thematic (STT) processing of semantic Web data and describe the Web infrastructure needed to support it. Starting from Ramesh Jain's vision of the EventWeb as a view of what's possible with a Web that better accommodates all three dimensions of event-related information (thematic, spatial, and temp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demystifying RESTful Data Coupling

    Publication Year: 2008, Page(s):87 - 90
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Compared to approaches such as Web services and the Web Services Description Language (WSDL), which promote specialization for each service interface, the uniform-interface constraint reduces client-server coupling and helps minimize gratuitous differences in interface and method semantics across disparate resources. REST isn't a silver bullet, but its flexibility and relative simplicity make it h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Anybody Home?

    Publication Year: 2008, Page(s):91 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    At the recent consumer electronics show CES the big story was about how all the devices we'll be buying in the very near future will be Internet-capable. We should think about the broader notion of an ecology of connected devices: why this notion didn't work in the past, what it'll take to make it work this time, and what issues we, as designers of this ecology, should be thinking about as we move... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collective Work

    Publication Year: 2008, Page(s):96 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    The idea behind collective work is that we're all attempting to perform individual tasks, and the ways in which we accomplish our objectives interact. Sometimes this is because we're all part of a larger project, and sometimes it's just because what we do can affect other people's plans if they know about what we've done. Sometimes, what we're attempting to do generates conflict with other people'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career [advertisement]

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (980 KB)
    Freely Available from IEEE
  • JavaOne

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (310 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami