By Topic

IEEE Internet Computing

Issue 6 • Nov.-Dec. 2000

Filter Results

Displaying Results 1 - 9 of 9
  • Author Index

    Publication Year: 2000, Page(s):86 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Subject index

    Publication Year: 2000, Page(s):89 - 97
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Network address translators: effects on security protocols and applications in the TCP/IP stack

    Publication Year: 2000, Page(s):42 - 49
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    One proposed method for mitigating the address shortage problem in IPv4 is to use network address translators (NATs) to allow address reuse. The basic idea is to transparently map a wide set of private network addresses and corresponding TCP/UDP ports to a small set of globally unique public network addresses and ports. NAT devices provide a way to handle IP address depletion incrementally, withou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework for the semantic Web: an RDF tutorial

    Publication Year: 2000, Page(s):68 - 73
    Cited by:  Papers (29)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    The current World Wide Web supports mainly human browsing and searching of textual content. This model has become less and less adequate as the mass of available information increases. What is required instead is a model that supports integrated and uniform access to information sources and services as well as intelligent applications for information processing on the Web. Such a model requires st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What makes security technologies relevant?

    Publication Year: 2000, Page(s):38 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1248 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A transport-level proxy for secure multimedia streams

    Publication Year: 2000, Page(s):57 - 67
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    To provide a secure traversal service, firewalls need more than static packet filtering and application-level proxies. SOCKS (Secure sOCKets) is an application-independent transport-level proxy that offers user-level authentification and data encryption. An extended SOCKS UDP (user datagram protocol) binding model with appropriate socket calls is proposed to provide complete support for UDP-based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LawBot: a multiagent assistant for legal research

    Publication Year: 2000, Page(s):32 - 37
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    LawBot is a system of Internet based agents that help to collect and organize the statutes and case histories relevant to a legal search. The system includes an ontology that maps colloquial terms to corresponding legal terminology, thus simplifying the system's use by people outside the legal profession View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key exchange in IPSec: analysis of IKE

    Publication Year: 2000, Page(s):50 - 56
    Cited by:  Papers (18)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    The IPSec (IP Security) protocol is a recently proposed standard of the Internet Engineering Task Force (IETF) for securing real-time communications on the Internet. The authors explain how its Internet Key Exchange (IKE) mechanism works and suggest improvements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PIPE: Web personalization by partial evaluation

    Publication Year: 2000, Page(s):21 - 31
    Cited by:  Papers (9)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB)

    Partial evaluation is a technique popular in the programming languages community. It is applied here as a methodology for personalizing Web content. PIPE (Personalization is Partial Evaluation) is able to personalize Web resources, without enumerating the interaction sequences beforehand. It supports information integration, and varying levels of input by Web visitors. PIPE models personalization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This magazine provides a journal-quality evaluation and review of Internet-based computer applications and enabling technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
M. Brian Blake
University of Miami