By Topic

Internet Computing, IEEE

Issue 2 • Date March-April 2008

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1452 KB)  
    Freely Available from IEEE
  • 2008-2009 Editorial Calendar

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (980 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (334 KB)  
    Freely Available from IEEE
  • Not-so-Secret Identities

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (686 KB)  

    The author relates stories about security and identity issues and how they relate to the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redefining the Server as Home Networks Emerge

    Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB)  

    Forrester Research, issued a US market forecast for home servers with a more than 10-fold increase between 2007 and 2012, from 400,000 to 4.5 million units. However, Gownder says that the industry will have to state the case for more efficient storage and retrieval of home networks to the vast bulk of potential customers, even those who run home-based data-dependent businesses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Organizations [Guest Editors' Introduction]

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (396 KB)  

    Today's organizations are no longer constrained by traditional time and place barriers. Instead, information technology supports virtual organizations: flexible networks of independent, globally distributed entities that share knowledge and resources and work toward a common goal. Resources aren't limited to computing power, but include elements as diverse as storage, network links, data sets, analysis tools, sensors, and scientific instruments. Sharing policies are highly diverse, given that sharing must be controlled, secure, flexible, and limited in time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the Gap between Legal and Technical Contracts

    Page(s): 13 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB)  

    Two or more parties typically establish a business relationship using a contract, but a large gap still exists between the provisions of contracts produced by lawyers and the details of computer security and performance addressed by technologists. Some contractual clauses address legal issues that technology can manage as well - the TrustCoM framework offers a paradigm for automating these clauses as technical operations. If a business relationship forms across a service-oriented architecture, the parties involved often manage their collaboration as a virtual organization (VO). In TrustCoM, agreements are the key means of steering VO collaborations and mitigating the risks inherent in integrating processes and resources across organizational boundaries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Organization Support within a Grid-Wide Operating System

    Page(s): 20 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (650 KB)  

    Despite grids' popularity, virtual organizations (VOs) have yet to become a commodity technology in modern computing environments due to the complexity of managing them and difficulty of assuring user and VO isolation. Here, the authors describe the VO management approach taken by XtreemOS, a new grid operating system with native support for VOs that supports a wide range of computing resources, from clusters to mobiles. They also discuss the requirements for the VO model and management within XtreemOS and introduce an expandable VO model and a system architecture that supports it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provisioning for Dynamic Instantiation of Community Services

    Page(s): 29 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (487 KB)  

    On-demand provisioning can allow collaborative communities to rapidly deploy the services required to support collaboration, without the need to acquire and operate dedicated hardware. To meet community needs for on- demand access while also maximizing global availability and runtime efficiency, the authors propose service-, container-, node-, and VO-level provisioning approaches based on a highly available dynamic deployment infrastructure. Their experiments with an image-processing application demonstrate their approach's efficiency and effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE Computer Society membership [advertisement]

    Page(s): 37
    Save to Project icon | Request Permissions | PDF file iconPDF (410 KB)  
    Freely Available from IEEE
  • Policy Mapper: Administering Location-Based Access-Control Policies

    Page(s): 38 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (807 KB)  

    Simplifying the administration of location-based access-control policies requires a mechanism that supports both intuitive and scalable spatial constraint specifications and a flexible enforcement architecture. Policy mapper is an administrative tool that helps define access control at conceptual and logical levels to carry out constraint specification and enforcement. The tool also provides an interface definition language that couples the two levels. Policy mapper bridges a critical gap between the expressiveness and enforcement of spatial constraints in location-based access-control policies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporating Events into Cross-Organizational Business Processes

    Page(s): 46 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB)  

    Because Web-scale processes are inherently cross-organizational, they require the robust enactment of interactions among autonomous parties. However, specifying the processes involved is difficult. To overcome this obstacle, the authors use a business protocol that lets the applicable events and responses vary based on where the process is deployed and the infrastructure and IT applications installed therein. Treating events and business logic as separate concerns also yields clearer models and improves reusability. The authors describe the architecture and tools and outline a methodology by which each participant in a process can define, detect, and respond to events. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Ontology Support for E-Commerce

    Page(s): 54 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (574 KB)  

    Privacy is becoming increasingly important due to the advent of e-commerce. E-commerce applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and regulations. Here, the authors define a privacy ontology to support the provision of privacy and help derive the level of privacy associated with e-commerce transactions and applications. The privacy ontology provides a framework against which e-commerce sites can benchmark their privacy policies and implementations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries

    Page(s): 62 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1788 KB)  

    As in many regions of the world, people in rural India often lack access to knowledge that's more readily available to people in urban areas. Although rural telecenters are becoming more common, developing content that's presented in local languages, relevant to users, and delivered in an immediately usable form is a challenge here and in rural areas across the globe. To address this, an agricultural portal for rural farmers in India uses innovative database systems and information retrieval techniques. In so doing, it both improves service and addresses connection costs and constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast to Broadband: Unlicensed Access to Unused TV Channels?

    Page(s): 71 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB)  

    Although much public attention has focused on the US digital TV transition- and the resulting reallocation of analog TV channels by auction to wireless carriers - the US Federal Communications Commission will decide how to reallocate an even larger swath of prime TV band spectrum this year: the unused "white space" between occupied DTV channels. This reallocation of unused spectrum from broadcasting to broadband permits unlicensed access for both fixed and mobile applications. Although this policy is strongly supported by high-tech companies and consumer advocates, it's just as strongly opposed by broadcast licensees and other incumbent users of the TV band. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards

    Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB)  

    The World Wide Web Consortium (W3C) promulgates the HTML standards used on the Web, but it has no authority to enforce the adoption of one standard in favor of another. In this environment, developers have some incentive to ignore up-to-date W3C standards given that the transitional versions of HTML 4.01 and XHTML 1.0 offer most of the capabilities of the newer ones but are less stringent in their requirements. If most Web sites migrate to these "transitional" standards and remain there, future versions might be mere academic exercises for the W3C. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traveling the Semantic Web through Space, Time, and Theme

    Page(s): 81 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (879 KB)  

    In this installment of Semantics and Services, we further develop the idea of spatial, temporal, and thematic (STT) processing of semantic Web data and describe the Web infrastructure needed to support it. Starting from Ramesh Jain's vision of the EventWeb as a view of what's possible with a Web that better accommodates all three dimensions of event-related information (thematic, spatial, and temporal), we outline the architecture needed to support it and current research that aims to realize it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demystifying RESTful Data Coupling

    Page(s): 87 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (433 KB)  

    Compared to approaches such as Web services and the Web Services Description Language (WSDL), which promote specialization for each service interface, the uniform-interface constraint reduces client-server coupling and helps minimize gratuitous differences in interface and method semantics across disparate resources. REST isn't a silver bullet, but its flexibility and relative simplicity make it highly applicable not only to Web-scale systems but also to a wide variety of enterprise integration problems. The representational state transfer (REST) architectural style, on the other hand, makes very specific and highly useful trade-offs meticulously chosen to enhance the scalability, extensibility, manageability, and maintainability of distributed systems and applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Anybody Home?

    Page(s): 91 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (145 KB)  

    At the recent consumer electronics show CES the big story was about how all the devices we'll be buying in the very near future will be Internet-capable. We should think about the broader notion of an ecology of connected devices: why this notion didn't work in the past, what it'll take to make it work this time, and what issues we, as designers of this ecology, should be thinking about as we move toward the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collective Work

    Page(s): 96 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    The idea behind collective work is that we're all attempting to perform individual tasks, and the ways in which we accomplish our objectives interact. Sometimes this is because we're all part of a larger project, and sometimes it's just because what we do can affect other people's plans if they know about what we've done. Sometimes, what we're attempting to do generates conflict with other people's objectives, and other times it generates opportunities. It would be great if we knew of these conflicts and opportunities - and if the Internet could tell us. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career [advertisement]

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (980 KB)  
    Freely Available from IEEE
  • JavaOne

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (310 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University