NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20190
Since 20180
Since 2015 (last 5 years)0
Since 2010 (last 10 years)0
Since 2000 (last 20 years)12
Source
Internet Research57
Education Level
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 57 results Save | Export
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Olla, Phillip; Patel, Nayna; Atkinson, Chris – Internet Research, 2003
Reports on a case study at an organization that created MADIC, an innovative approach to developing mobile applications developed by third party independent developer. Presents MMO2's, a conceptual wireless reference model used to define the various system constituents required to create effective mobile applications. (Author/AEF)
Descriptors: Case Studies, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Bouras, C.; Ganos, P.; Karaliotas, A. – Internet Research, 2003
The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…
Descriptors: Computer Networks, Computer System Design, Design Requirements, Information Networks
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Stuer, Gunther; Broeckhove, Jan; Arickx, Frans – Internet Research, 2003
Presents the design and implementation of a reliable multipeer protocol (RMPP), which is written in Java and is suitable for applications in the area of distributed virtual environments (DVEs). Discusses motivation, protocol classification, design goals and the error recovery algorithm and lists implementation issues. Presents two possible…
Descriptors: Computer Networks, Computer Simulation, Computer System Design, Design Requirements
Peer reviewed Peer reviewed
Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Peer reviewed Peer reviewed
Loo, Alfred; Choi, Y. K. – Internet Research, 2002
In peer-to-peer systems, the lack of dedicated links between constituent computers presents a major challenge. Discusses the problems of distributed database operation with reference to an example. Presents two statistical selection algorithms-one for the intranet with broadcast/multicast facilities, the other for Internet without…
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Databases
Peer reviewed Peer reviewed
Angeles, Rebecca – Internet Research, 2001
This study seeks a practical understanding of the business, organizational, and technical components of and implementation guidelines needed to effectively deploy extranets. It aims to establish a basic conceptual framework for understanding extranet implementation guidelines. Provides a specific case using VF Playwear, Inc.'s HealthTexbtob.com, a…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Computer Oriented Programs
Peer reviewed Peer reviewed
Carroll, John M.; Rosson, Mary Beth; Isenhour, Philip L.; Van Metre, Christina; Schafer, Wendy A.; Ganoe, Craig H. – Internet Research, 2001
Explains MOOsburg, a community-oriented MOO that models the geography of the town of Blacksburg, Virginia and is designed to be used by local residents. Highlights include the software architecture; client-server communication; spatial database; user interface; interaction; map-based navigation; application development; and future plans. (LRW)
Descriptors: Community Information Services, Computer Interfaces, Computer Networks, Computer Software
Peer reviewed Peer reviewed
Wang, Shouhong – Internet Research, 2000
Shifting between different linkages of the partners for satisfying a need is the major characteristic of the virtual organization, and meta-management beyond the individual organizational level must be applied in order to optimize the benefit for the entire organizational network. Presents a meta-management support framework based on the…
Descriptors: Administration, Business, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan – Internet Research, 1999
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Descriptors: Computer Networks, Computer Security, Information Retrieval, Local Area Networks
Peer reviewed Peer reviewed
Hofmann, Holger D.; Muench, Volker; Stynes, Jeanne – Internet Research, 1999
Explains componentware, a new paradigm in software development that is based on the concept of a software component, a self-contained unit of software which can be distributed over large networks. Discusses the need for new, Internet-based search and retrieval mechanisms, and the architectural requirements and mechanisms of componentware.…
Descriptors: Computer Networks, Computer Software Development, Information Retrieval, Internet
Peer reviewed Peer reviewed
Chou, David C. – Internet Research, 1998
Moving corporate systems onto an intranet will increase the data traffic within the corporate network, which necessitates a high-quality management process to the intranet. Discusses costs and benefits of adopting an intranet, tool availability and selection criteria, and management issues for developing an intranet. (Author/AEF)
Descriptors: Business, Computer Mediated Communication, Computer Networks, Corporations
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4