By Topic

Internet Computing, IEEE

Issue 3 • Date May-June 2008

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2008 , Page(s): c1
    Request Permissions | PDF file iconPDF (1092 KB)  
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2008 , Page(s): c2
    Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): 1 - 2
    Request Permissions | PDF file iconPDF (528 KB)  
    Freely Available from IEEE
  • The Eye of the Beholder: Whence IC?

    Publication Year: 2008 , Page(s): 3 - 5
    Request Permissions | PDF file iconPDF (1504 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Should We Stop Trusting Trust?

    Publication Year: 2008 , Page(s): 6 - 9
    Request Permissions | PDF file iconPDF (311 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Useful Computer Security

    Publication Year: 2008 , Page(s): 10 - 12
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Usability is a growing concern in designing systems and applications that operate securely. Most usability work has focused on improving user interfaces, but security is systemic, and negotiating, instituting, and maintaining real-world security procedures and practices is an organizational and social activity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Brief Introduction to Usable Security

    Publication Year: 2008 , Page(s): 13 - 21
    Cited by:  Papers (3)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (791 KB) |  | HTML iconHTML  

    Researchers have studied usable computer security for more than 20 years, and developers have created numerous security interfaces. Here, the authors examine research in this space, starting with a historical look at papers that address two consistent problems: user authentication and email encryption. Drawing from successes and failures within these areas, they study several security systems to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs

    Publication Year: 2008 , Page(s): 22 - 30
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    IT security professionals' effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization's security management model (SMM) fits. Finding the right SMM is critical but can be challenging - trade-offs are inherent to each approach, but their implications aren't always clear. The authors present a case study of one acad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE Computer Society membership [advertisement]

    Publication Year: 2008 , Page(s): 31
    Request Permissions | PDF file iconPDF (410 KB)  
    Freely Available from IEEE
  • Using Ontologies and Vocabularies for Dynamic Linking

    Publication Year: 2008 , Page(s): 32 - 39
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (916 KB) |  | HTML iconHTML  

    Ontology-based linking offers a solution to some of the problems with static, restricted, and inflexible traditional Web linking. Conceptual hypermedia provides navigation between Web resources, supported by a conceptual model, in which an ontology's definitions and structure, together with the lexical labels, drive the consistency of link provision and the linking's dynamic aspects. Lightweight s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IMS Application Servers: Roles, Requirements, and Implementation Technologies

    Publication Year: 2008 , Page(s): 40 - 51
    Cited by:  Papers (14)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (512 KB) |  | HTML iconHTML  

    The IP multimedia subsystem (IMS) defines a generic architecture to support communication services over a Session Initiation Protocol (SIP) infrastructure. In the IMS architecture, application servers host and execute the IMS service logic. These servers can be SIP application servers, open services architecture (OSA) application servers, or a customized applications for mobile networks using enha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WebRB: A Different Way to Write Web Applications

    Publication Year: 2008 , Page(s): 52 - 61
    Request Permissions | Click to expandAbstract | PDF file iconPDF (546 KB) |  | HTML iconHTML  

    Relational Blocks (RBIocks) is a visual dataflow language for writing multipage interactive applications that access, transform, and display relational data in a GUI. The authors present WebRB, an implementation of RBIocks for a Web application environment. It's deployed as a software service; developers run the WebRB visual editor in a standard Firefox Web browser and store their page designs and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unifying Human and Software Services in Web-Scale Collaborations

    Publication Year: 2008 , Page(s): 62 - 68
    Cited by:  Papers (32)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    As collaborative Web-based platforms evolve into service-oriented architectures, they promote composite and user-enriched services. In such platforms, the collaborations typically involve both humans and software services, thus creating highly dynamic and complex interactions. However, today's collaboration tools don't let humans specify different interaction interfaces (services), which can be re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will the Overseas Expansion of Facebook Succeed?

    Publication Year: 2008 , Page(s): 69 - 73
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    Social networking sites (SNSs) are becoming mainstream and are spreading worldwide. Here, the authors review Facebook and Orkut, two major SNSs, and analyze a recent survey conducted among Indian and Pakistani Orkut users. They aim to investigate Orkut users' experiences with Facebook, which has a stronghold in the US and is expanding globally to compete with Orkut. The survey indicates that the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Web Services in Search Engines

    Publication Year: 2008 , Page(s): 74 - 77
    Cited by:  Papers (16)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Web service access points are no longer a scarce resource, and the process of discovering them is no longer attached to service registries as Web search engines have become a new major source for Web services. Unfortunately, these separate but distinct approaches to service discovery make it unclear whether provisional registry specifications and search-engine technologies will eventually emerge o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Synthetic Data to Match Data Mining Patterns

    Publication Year: 2008 , Page(s): 78 - 82
    Cited by:  Papers (2)  |  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    Synthetic data sets can be useful in a variety of situations, including repeatable regression testing and providing realistic - but not real - data to third parties for testing new software. Researchers, engineers, and software developers can test against a safe data set without affecting or even accessing the original data, insulating them from privacy and security concerns as well as letting the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilanguage Programming

    Publication Year: 2008 , Page(s): 83 - 85
    Request Permissions | Click to expandAbstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    Knowing and using multiple programming languages for normal day-to-day development can yield significant benefits. No single language is a great fit for all problems. A programming language usually owes its existence to one simple fact: its designer felt it could address a set of problems - perhaps even just one problem - better than other available languages. This belief is apparently not uncommo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Net Neutrality... Seriously this Time

    Publication Year: 2008 , Page(s): 86 - 89
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (166 KB) |  | HTML iconHTML  

    The net neutrality debate began a few years ago, prematurely, with overheated rhetoric about potential disasters for the Internet but little in the way of real threats requiring immediate government action. Beginning around May 2007, one of the largest ISPs in the US, Comcast, began a program of discriminatory blocking of certain Internet communications protocols. The blocking has focused on BitTo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable Storage and Data Loss

    Publication Year: 2008 , Page(s): 90 - 93
    Cited by:  Patents (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (645 KB) |  | HTML iconHTML  

    Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information leakage related to portable storage - for example, your laptop hard-disk - and what might best mitigate that. This article briefly considers some recent incidents, describe pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Myth of Open Web Services: The Rise of the Service Parks

    Publication Year: 2008 , Page(s): 96 - 95
    Cited by:  Papers (8)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (155 KB) |  | HTML iconHTML  

    Issues of trust, reliability, and data heterogeneity make it unlikely that we'll have access to a set of free and heterogenous Web services and tools to combine them on the Internet anytime soon. The authors contend, instead, that "service parks" will rise and succeed in the near future as execution environments that support simplified data integration and service reliability. As service park owne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Internet Computing Editorial Calendar

    Publication Year: 2008 , Page(s): c3
    Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Build Your Career [advertisement]

    Publication Year: 2008 , Page(s): c4
    Request Permissions | PDF file iconPDF (955 KB)  
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami