By Topic

IBM Systems Journal

Issue 1 • Date 1998

Filter Results

Displaying Results 1 - 11 of 11
  • Preface

    Publication Year: 1998, Page(s):2 - 3
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1139 KB)

    The explosive growth of uses for computer networks and users of such networks has been characterized by and depends on technical advances in many directions and along many dimensions. The entire computer industry has been affected by the dramatic and rapid shift of information, communications, applications, and businesses to direct residence on and indirect access through networks and especially t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Messaging Frameworks

    Publication Year: 1998, Page(s):4 - 18
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2879 KB)

    Electronic mail (e-mail) has become an important tool for companies to use to conduct their businesses. With the introduction of the World Wide Web, awareness of the existence of the Internet has exponentially increased over the last two years, and people are starting to realize that there is more to the Internet than just the Web. Companies are expanding their use of e-mail from internal to exter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetVista: Growing an Internet solution for schools

    Publication Year: 1998, Page(s):19 - 41
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2957 KB)

    NetVista™ is an integrated suite of clients and servers supporting Internet access for students and teachers in kindergarten through 12th-grade schools. Developed by a small team of IBM researchers, NetVista is a prime example of using an object-oriented framework to support user-centered design and to accommodate Internet-paced changes in network infrastructure, functionality, and user exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security architecture for the Internet Protocol

    Publication Year: 1998, Page(s):42 - 60
    Cited by:  Papers (6)  |  Patents (16)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2600 KB)

    In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer. The design includes three components: (1) a security policy for determining when, where, and how security measures are to be applied; (2) a modular key management protocol, called MKMP, for establishing share... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surf ‘N’ Sign: Client signatures on Web documents

    Publication Year: 1998, Page(s):61 - 71
    Cited by:  Patents (12)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2073 KB)

    The emergence of World Wide Web-based systems and Web transactions has led to the need to find a mechanism that provides electronic signature capabilities as a replacement for written signatures. Such a mechanism should guarantee authentication and nonrepudiation. Many Web applications could benefit greatly from such a mechanism, e.g., banking systems, tax filing, reservation systems, and corporat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a generic payment service

    Publication Year: 1998, Page(s):72 - 88
    Cited by:  Papers (10)  |  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2117 KB)

    The growing importance of electronic commerce has resulted in the introduction of a variety of different and incompatible payment systems. For business application developers, this variety implies the need to understand the details of different systems, to adapt the code as soon as new payment systems are introduced, and also to provide a way of picking a suitable payment instrument for every tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SpeedTracer: A Web usage mining and analysis tool

    Publication Year: 1998, Page(s):89 - 105
    Cited by:  Papers (13)  |  Patents (42)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2635 KB)

    SpeedTracer, a World Wide Web usage mining and analysis tool, was developed to understand user surfing behavior by exploring the Web server log files with data mining techniques. As the popularity of the Web has exploded, there is a strong desire to understand user surfing behavior. However, it is difficult to perform user-oriented data mining and analysis directly on the server log files because ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Catapults and grappling hooks: The tools and techniques of information warfare

    Publication Year: 1998, Page(s):106 - 114
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1716 KB)

    For years, “hackers” have broken into computer systems, and now an entire industry is dedicated to computer network security. Both hackers and computer security professionals have developed software tools for either breaking into systems or identifying potential security problems within computer networks. This software can be found on compromised systems as well as within the toolkit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accessing existing business data from the World Wide Web

    Publication Year: 1998, Page(s):115 - 132
    Cited by:  Papers (2)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3326 KB)

    The World Wide Web has experienced phenomenal growth over the last few years. Although, at its inception, Web technology was primarily used to retrieve information stored in static documents, important current uses of the Web include retrieval of dynamically changing information and the conducting of business transactions. Such uses of the Web result in access to dynamically changing data on or th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBM eNetwork Host On-Demand: The beginning of a new era for accessing host information in a Web environment

    Publication Year: 1998, Page(s):133 - 151
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3061 KB)

    This paper describes software technology that makes it possible to run host applications seamlessly in a World Wide Web environment. Web technology has opened up the potential for unprecedented access of data and applications by all types of users. Yet, the incompatibility between host technology (e.g., 3270) and Web technology (e.g., HTTP) has prevented Web users from directly accessing hundreds ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Errata [Erratum]

    Publication Year: 1998, Page(s): 152
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (950 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Throughout its history, the IBM Systems Journal has been devoted to software, software systems, and services, focusing on concepts, architectures, and the uses of software.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
John J. Ritsko
IBM T. J. Watson Research Center5