IEEE Internet Computing

Issue 3 • May-June 2011

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (569 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (810 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (458 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | |PDF file iconPDF (557 KB)
    Freely Available from IEEE
  • Computer Science, Informatics, and the Networked World

    Publication Year: 2011, Page(s):4 - 6
    Request permission for commercial reuse | |PDF file iconPDF (637 KB) | HTML iconHTML
    Freely Available from IEEE
  • Huge Growth for Video Telephony? Skeptics Wary of Predicted Data Crunch

    Publication Year: 2011, Page(s):7 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB) | HTML iconHTML

    The advent of smart phones with front facing cameras and ever-increasing broad band network capabilities has once again brought to the fore the promise and challenges of video telephony. However, some industry observers believe that predictions of a mass take-up of consumer-level video chats, and its commensurate ability to overwhelm network capacity, views more like a rerun of unmet predictions p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Privacy in Social Networks

    Publication Year: 2011, Page(s):10 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | |PDF file iconPDF (747 KB) | HTML iconHTML
    Freely Available from IEEE
  • Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks

    Publication Year: 2011, Page(s):13 - 19
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (580 KB) | HTML iconHTML

    Most people have multiple accounts on different social networks. Because these networks offer various levels of privacy protection, the weakest privacy policies in the social network ecosystem determine how much personal information is disclosed online. A new information leakage measure quantifies the information available about a given user. Using this measure makes it possible to evaluate the vu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-Related Privacy in Geo-Social Networks

    Publication Year: 2011, Page(s):20 - 27
    Cited by:  Papers (43)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (757 KB) | HTML iconHTML

    Geo-social networks (GeoSNs) provide context-aware services that help associate location with users and content. The proliferation of GeoSNs indicates that they're rapidly attracting users. GeoSNs currently offer different types of services, including photo sharing, friend tracking, and "check-ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam

    Publication Year: 2011, Page(s):28 - 34
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (457 KB) | HTML iconHTML

    Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the feasibility of such an attack and simulate the impact on Facebook. Alarmingly, all major social networking sites are vulnerable to this attack because they... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving Relation Privacy in Online Social Network Data

    Publication Year: 2011, Page(s):35 - 42
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (856 KB) | HTML iconHTML

    Online social networks routinely publish data of interest to third parties, but in so doing often reveal relationships, such as a friendship or contractual association, that an attacker can exploit. This systematic look at existing privacy-preservation techniques highlights the vulnerabilities of users even in networks that completely anonymize identities. Through a taxonomy that categorizes techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy

    Publication Year: 2011, Page(s):43 - 50
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (535 KB) | HTML iconHTML

    Cost and testing considerations limit the acceptance and deployment of technologies that make information exchanges more secure, reliable, semantically understandable, and self-improving. PbProxy is a flexible proxy that enables transparent insertion of custom logic into HTTP and HTTPS interactions. It has successfully been used to facilitate behavior-based prevention of phishing attacks, machine ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Federating Websites with the Google Wave Protocol

    Publication Year: 2011, Page(s):51 - 58
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1595 KB) | HTML iconHTML

    This article presents a software architecture and communication protocol for synchronizing user-generated content across websites in near real time. The technique builds on the Google Wave Federation Protocol, allowing websites to mashup and cooperate in ways that are difficult to achieve with other mashup techniques. The authors also present a set of requirements for modern federated websites, al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watching Video over the Web: Part 2: Applications, Standardization, and Open Issues

    Publication Year: 2011, Page(s):59 - 63
    Cited by:  Papers (29)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (551 KB) | HTML iconHTML

    Many video streaming applications and services exist on the Internet, and we covered several of them in part 1 of this article.1 The most important applications argu ably fall into the mobile and home entertainment categories, which span the range of video presentation formats for portable (PD), standard (SD), and high-definition (HD) video, and these applications include both walled-garden and In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Social Compute Unit

    Publication Year: 2011, Page(s):64 - 69
    Cited by:  Papers (31)  |  Patents (1)
    Request permission for commercial reuse | |PDF file iconPDF (541 KB) | HTML iconHTML
    Freely Available from IEEE
  • Globus Online: Accelerating and Democratizing Science through Cloud-Based Services

    Publication Year: 2011, Page(s):70 - 73
    Cited by:  Papers (88)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (317 KB) | HTML iconHTML

    Many businesses today save time and money, and increase their agility, by outsourcing mundane IT tasks to cloud providers. The author argues that similar methods can be used to overcome the complexities inherent in increas ingly data-intensive, computational, and collaborative scientific research. He describes Globus Online, a system that he and his colleagues are developing to realize this vision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing Standards: Where's the Beef?

    Publication Year: 2011, Page(s):74 - 78
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (402 KB) | HTML iconHTML

    In this paper, cloud computing standards are discussed. The basic idea of cloud computing is simple: centralized service organizations maintain and support IT services, freeing users from nearly all operational and administrative burdens. These service organizations are often subdivided based on whether they provide software-as-a service, platform-as-a-service, and infrastructure as-a-service, but... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usefulness Is Not Trustworthiness

    Publication Year: 2011, Page(s):79 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (249 KB) | HTML iconHTML

    When discussing ways to ensure that a system remains predictable in the face of bugs, attacks, and failures, the students inevitably reach a point where they have to trust that something or set of things behaves as advertised. If a system is well-designed, then this set of trusted components will be small, and interactions between trusted and untrusted components will be constrained by a set of na... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Warp: A Haskell Web Server

    Publication Year: 2011, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (785 KB) | HTML iconHTML

    Warp allows Haskell developers to write Web applications at a high level and still achieve very fast applications. Warp is currently the basis of the Yesod Web Framework's production deployment, and will be used by the HappstackWeb Framework in the near future. Due to Warp's small code size, it can run anywhere, from large dedicated servers to embedded devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in the Wild

    Publication Year: 2011, Page(s):86 - 91
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1057 KB) | HTML iconHTML

    Delay- and disruption-tolerant networking (DTN) is an active area of networking research on which our team at Trinity College Dublin has been working for several years. Our emphasis has always been on testing DTN technologies in the real world, to the extent that our funding allows. DTN aims to provide Internet like services for nodes that are in communications challenged areas and has application... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Crowdsourcing to Crowdservicing

    Publication Year: 2011, Page(s):92 - 94
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (269 KB) | HTML iconHTML

    The evolving vision of Web 3.0 is based on the balanced integration of diverse services provided by human agents and machines over the World Wide Web. This is also the intuition that drives crowdservicing, which helps in creating platforms on which new applications and even enterprises can be build. Crowdsourcing as a concept as well as a practice refers to the idea that the Web can facilitate the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bufferbloat: Dark Buffers in the Internet

    Publication Year: 2011, Page(s): 96
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (873 KB) | HTML iconHTML

    We have conflated "speed" with "band width." As Stuart Chesire wrote in "It's the Latency, Stupid" (http://rescomp.stanford.edu/~cheshire/rants/Latency.html), "Making more bandwidth is easy. Once you have bad latency, you're stuck with it." Bufferbloat is the existence of excessively large (bloated) buffers in systems, particularly network communication systems. Bufferbloat is now (almost?) everyw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | |PDF file iconPDF (1418 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (518 KB)
    Freely Available from IEEE

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami