Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Mediated… | 7 |
Computer Security | 7 |
Computer System Design | 7 |
Computer Networks | 6 |
Internet | 5 |
Information Networks | 3 |
Information Technology | 3 |
Information Policy | 2 |
Online Systems | 2 |
Shared Resources and Services | 2 |
Access to Information | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Carroll, Michael L. | 1 |
Downs, W. Scott | 1 |
Hong, Pei-lin | 1 |
Horn, G. | 1 |
Kroselberg, D. | 1 |
Li, Jin-sheng | 1 |
Littman, Marlyn Kemper | 1 |
Miladinovic, Igor | 1 |
Muller, K. | 1 |
Smith, Shana Shiang-Fong | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Smith, Shana Shiang-Fong – Journal of Technology Studies, 2004
Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…
Descriptors: Intellectual Property, Internet, Distance Education, Computer Assisted Design

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Carroll, Michael L.; Downs, W. Scott – 1996
Many organizations grapple with a glut of electronic information spawned by stockpiles of incompatible computers. This book offers solutions in information sharing and computer interaction. Rather than being about the Internet per se, it is about approaches that are characteristic of the Internet and the managerial and technical aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design