By Topic

Internet Computing, IEEE

Issue 3 • Date May-June 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1092 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (528 KB)  
    Freely Available from IEEE
  • The Eye of the Beholder: Whence IC?

    Page(s): 3 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1504 KB)  
    Freely Available from IEEE
  • Should We Stop Trusting Trust?

    Page(s): 6 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (311 KB)  
    Freely Available from IEEE
  • Useful Computer Security

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB)  

    Usability is a growing concern in designing systems and applications that operate securely. Most usability work has focused on improving user interfaces, but security is systemic, and negotiating, instituting, and maintaining real-world security procedures and practices is an organizational and social activity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Brief Introduction to Usable Security

    Page(s): 13 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (791 KB)  

    Researchers have studied usable computer security for more than 20 years, and developers have created numerous security interfaces. Here, the authors examine research in this space, starting with a historical look at papers that address two consistent problems: user authentication and email encryption. Drawing from successes and failures within these areas, they study several security systems to determine how important design is to usable security. Their discussion offers guidelines for future system design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs

    Page(s): 22 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB)  

    IT security professionals' effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization's security management model (SMM) fits. Finding the right SMM is critical but can be challenging - trade-offs are inherent to each approach, but their implications aren't always clear. The authors present a case study of one academic institution that created a centralized security team but disbanded it in favor of a more distributed approach three years later. They contrast these experiences with expectations from industry standards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE Computer Society membership [advertisement]

    Page(s): 31
    Save to Project icon | Request Permissions | PDF file iconPDF (410 KB)  
    Freely Available from IEEE
  • Using Ontologies and Vocabularies for Dynamic Linking

    Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (916 KB)  

    Ontology-based linking offers a solution to some of the problems with static, restricted, and inflexible traditional Web linking. Conceptual hypermedia provides navigation between Web resources, supported by a conceptual model, in which an ontology's definitions and structure, together with the lexical labels, drive the consistency of link provision and the linking's dynamic aspects. Lightweight standard representations make it possible to use existing vocabularies to support Web navigation and browsing. In this way, the navigation and linking of diverse resources (including those not in our control) based on a community understanding of the domain can be consistently managed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMS Application Servers: Roles, Requirements, and Implementation Technologies

    Page(s): 40 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (512 KB)  

    The IP multimedia subsystem (IMS) defines a generic architecture to support communication services over a Session Initiation Protocol (SIP) infrastructure. In the IMS architecture, application servers host and execute the IMS service logic. These servers can be SIP application servers, open services architecture (OSA) application servers, or a customized applications for mobile networks using enhanced logic (Camel) service environment. Some technologies used in telephony and voice-over-IP (VoIP) application servers are also applicable to IMS application servers, but such servers have some unique requirements that could limit the extent to which these technologies can meet them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WebRB: A Different Way to Write Web Applications

    Page(s): 52 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (546 KB)  

    Relational Blocks (RBIocks) is a visual dataflow language for writing multipage interactive applications that access, transform, and display relational data in a GUI. The authors present WebRB, an implementation of RBIocks for a Web application environment. It's deployed as a software service; developers run the WebRB visual editor in a standard Firefox Web browser and store their page designs and data on the WebRB server. WebRB is a different way to write Web applications because it uses visual page designs, lacks imperative code, and uses relational semantics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unifying Human and Software Services in Web-Scale Collaborations

    Page(s): 62 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB)  

    As collaborative Web-based platforms evolve into service-oriented architectures, they promote composite and user-enriched services. In such platforms, the collaborations typically involve both humans and software services, thus creating highly dynamic and complex interactions. However, today's collaboration tools don't let humans specify different interaction interfaces (services), which can be reused in various collaborations. Furthermore, humans need more ways to indicate their availability and desire to participate in collaborations. The human-provided services (HPS) framework lets people manage their interactions and seamlessly integrate their capabilities into Web-scale workflows as services. It unifies humans and software services and supports ad hoc and process-centric collaborations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will the Overseas Expansion of Facebook Succeed?

    Page(s): 69 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (202 KB)  

    Social networking sites (SNSs) are becoming mainstream and are spreading worldwide. Here, the authors review Facebook and Orkut, two major SNSs, and analyze a recent survey conducted among Indian and Pakistani Orkut users. They aim to investigate Orkut users' experiences with Facebook, which has a stronghold in the US and is expanding globally to compete with Orkut. The survey indicates that the conservative and anticommercial Indian and Pakistani cultures might be a major challenge for Facebook in competing with Orkut in these societies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Web Services in Search Engines

    Page(s): 74 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB)  

    Web service access points are no longer a scarce resource, and the process of discovering them is no longer attached to service registries as Web search engines have become a new major source for Web services. Unfortunately, these separate but distinct approaches to service discovery make it unclear whether provisional registry specifications and search-engine technologies will eventually emerge or coexist. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Synthetic Data to Match Data Mining Patterns

    Page(s): 78 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB)  

    Synthetic data sets can be useful in a variety of situations, including repeatable regression testing and providing realistic - but not real - data to third parties for testing new software. Researchers, engineers, and software developers can test against a safe data set without affecting or even accessing the original data, insulating them from privacy and security concerns as well as letting them generate larger data sets than would be available using only real data. Practitioners use data mining technology to discover patterns in real data sets that aren't apparent at the outset. This article explores how to combine information derived from data mining applications with the descriptive ability of synthetic data generation software. Our goal is to demonstrate that at least some data mining techniques (in particular, a decision tree) can discover patterns that we can then use to inverse map into synthetic data sets. These synthetic data sets can be of any size and will faithfully exhibit the same (decision tree) patterns. Our work builds on two technologies: synthetic data definition language and predictive model markup language. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilanguage Programming

    Page(s): 83 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (158 KB)  

    Knowing and using multiple programming languages for normal day-to-day development can yield significant benefits. No single language is a great fit for all problems. A programming language usually owes its existence to one simple fact: its designer felt it could address a set of problems - perhaps even just one problem - better than other available languages. This belief is apparently not uncommon: thousands of languages have come and gone and thousands more will follow. Numerous trade-offs are involved in programming language design and development, so there's room for many different approaches and variants. Unsurprisingly, monolingual developers tend to choose general-purpose rather than specialized programming languages. General-purpose languages perform adequately for a wide variety of problems, but they generally yield predominantly middle-of-the-road solutions - neither great nor terrible. Of course, some monolingual developers possess extremely deep and thorough knowledge of their programming languages, and so know how to exploit them to the fullest. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Net Neutrality... Seriously this Time

    Page(s): 86 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB)  

    The net neutrality debate began a few years ago, prematurely, with overheated rhetoric about potential disasters for the Internet but little in the way of real threats requiring immediate government action. Beginning around May 2007, one of the largest ISPs in the US, Comcast, began a program of discriminatory blocking of certain Internet communications protocols. The blocking has focused on BitTorrent and Gnutella peer-to-peer protocols but also included, for a time, Lotus Notes enterprise collaboration software traffic. Comcast hasn't disputed the blocking, and a variety of independent, although perhaps not entirely unbiased, investigations have verified it. So, for the first time in the Internet's modern history, we have selective discrimination against a particular type of traffic that's widely used and presumptively legal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable Storage and Data Loss

    Page(s): 90 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (645 KB)  

    Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information leakage related to portable storage - for example, your laptop hard-disk - and what might best mitigate that. This article briefly considers some recent incidents, describe practical mitigation steps, and look at how we might plan, in advance, for handling such events. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Myth of Open Web Services: The Rise of the Service Parks

    Page(s): 96 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (155 KB)  

    Issues of trust, reliability, and data heterogeneity make it unlikely that we'll have access to a set of free and heterogenous Web services and tools to combine them on the Internet anytime soon. The authors contend, instead, that "service parks" will rise and succeed in the near future as execution environments that support simplified data integration and service reliability. As service park owners establish and leverage branding of their efforts, they will likely build trust within the Web service user community. The most successful service parks will allow users and service providers other than the park owners to to be easily provide and modify services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing Editorial Calendar

    Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Build Your Career [advertisement]

    Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (955 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Michael Rabinovich
Department of Electrical Engineering and Computer Science
Case Western Reserve University