212 resources related to Extranets
- Topics related to Extranets
- IEEE Organizations related to Extranets
- Conferences related to Extranets
- Periodicals related to Extranets
- Most published Xplore authors for Extranets
2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )
ETFA focus is on the latest developments and new technologies in the field of industrial and factory automation. The conference aims to exchange ideas with both industry leaders and a variety of experienced researchers, developers, and practitioners from several industries, research institutes, and academia
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE
2020 IEEE 18th International Conference on Industrial Informatics (INDIN)
INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia
The Optical Fiber Communication Conference and Exhibition (OFC) is the largest global conference and exhibition for optical communications and networking professionals. For over 40 years, OFC has drawn attendees from all corners of the globe to meet and greet, teach and learn, make connections and move business forward.OFC attracts the biggest names in the field, offers key networking and partnering opportunities, and provides insights and inspiration on the major trends and technology advances affecting the industry. From technical presentations to the latest market trends and predictions, OFC is a one-stop-shop.
With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Management of technical functions such as research, development, and engineering in industry, government, university, and other settings. Emphasis is on studies carried on within an organization to help in decision making or policy formation for RD&E.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...
The 9th International Conference on Advanced Communication Technology, 2007
In order to be effective and efficient, e-collaboration applications frequently need to interact with numerous other applications, many of these applications may be within the same firm - intranet; some of them might be another participating firm's application - extranet. Service oriented approach is expected to provide a solution to this issue and many organizations are undertaking SOA deployment but ...
Seventeenth Annual Computer Security Applications Conference, 2001
The issue of certificate masquerading against the SSL protocol is pointed out in Hayes (1998). In Hayes, various forms of server certificate masquerading are identified. It should also be noted that the attack described is a man-in- the-middle (MITM) attack that requires direct manipulation of the SSL protocol. This paper is a mirror of Hayes and involves client certificate masquerading. ...
PICMET '01. Portland International Conference on Management of Engineering and Technology. Proceedings Vol.1: Book of Summaries (IEEE Cat. No.01CH37199), 2001
This research (a review of current literature and empirical research) suggests that in order to make the e-supply chain for technology transfer of a Western country company (i.e., technology supplier) more efficient and effective than the conventional technology development and delivery approach, it should be considered as a process whose phases include planning, implementation and evaluation. This paper focuses only ...
2002 IEEE International Conference on Data Mining, 2002. Proceedings., 2002
We present our experience in mining web usage patterns from a large collection of Livelink log data. Livelink is a web-based product of Open Text, which provides automatic management and retrieval of different types of information objects over an intranet or extranet. We report our experience in preprocessing raw log data and post-processing the mining results for finding interesting rules. ...
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003
In order to be effective and efficient, e-collaboration applications frequently need to interact with numerous other applications, many of these applications may be within the same firm - intranet; some of them might be another participating firm's application - extranet. Service oriented approach is expected to provide a solution to this issue and many organizations are undertaking SOA deployment but most of these implementations result in sub- optimal due to lack of proper framework. Keeping the above as the research issue, this study aims to facilitate the development of a framework which will help in the efficient management of the services in a service-oriented environment so as to allow businesses to rapidly develop, integrate and reuse applications in order to deliver dynamic solutions as e-collaboration needs to evolve.
The issue of certificate masquerading against the SSL protocol is pointed out in Hayes (1998). In Hayes, various forms of server certificate masquerading are identified. It should also be noted that the attack described is a man-in- the-middle (MITM) attack that requires direct manipulation of the SSL protocol. This paper is a mirror of Hayes and involves client certificate masquerading. The motivation for this paper comes from the fact that this anomaly has shown up in commercial products. It is potentially more damaging than in Hayes since a MITM attack is not involved and the only requirement is that the application trust a given root certificate authority (CA). The problem arises when applications use multiple roots that do not cross-certify. The problem is further exacerbated since the applications themselves do not have the ability to apply external name constraints and policies. Unfortunately, the problem is a fairly well known problem, within the public key infrastructure (PKI) community, but continues to persist in practice despite this knowledge.
This research (a review of current literature and empirical research) suggests that in order to make the e-supply chain for technology transfer of a Western country company (i.e., technology supplier) more efficient and effective than the conventional technology development and delivery approach, it should be considered as a process whose phases include planning, implementation and evaluation. This paper focuses only on the e-supply chain for technology package development for international technology transfer, and does not deal with all the aspects of IT-supported technology transfer process.
We present our experience in mining web usage patterns from a large collection of Livelink log data. Livelink is a web-based product of Open Text, which provides automatic management and retrieval of different types of information objects over an intranet or extranet. We report our experience in preprocessing raw log data and post-processing the mining results for finding interesting rules. In particular we compare and evaluate a number of rule interestingness measures and find that two of the measures that have not been used in association rule learning work very well.
EXE Extranet Education is an R&D project of a consortium of ten European partners built around the partnership of three local administrations (Bologna, London Islington and Barcelona) with a longstanding commitment to new technologies and citizen access. The project is co-financed by the European Commission after the Joint Call for Projects in the field of Educational Multimedia (December 1996). The objective of the project is to develop a multimedia toolkit to help teachers from across the educational spectrum to introduce new technologies in their daily didactic activities. EXE will provide the teachers with an Extranet which brings them in contact with colleagues in their city and in other parts of Europe. On the Extranet, teachers will find easy-to-use tools to develop their own course material: Educational Wizards for the design of lessons and didactic modules and a syllabus definition method for course development.
We describe a simple policy language for setting up and running firewalls (FW). The language allows to describe sophisticated policies for controlling network connections. Composition is done at set-up time, when a parser, starting from a given policy, generates the relative configuration file for one or more firewalls operating the industry-standard Linux Iptables kernel extension. The policy captures the essence of the desired requirements and constrains upon connections between zones. The language has been designed and it is currently on testing in the context of a large intra/extranet with more than 10,000 assigned IP addresses.
This paper describes an extranet system implemented for a major UK bank to permit the management of many thousand annual branch 'upgrade' projects by the bank's property services division. The system has been developed to provide intuitive use by a user community of project managers, design consultants and contractors. The system differs from traditional hosted extranet services in that it has been developed specifically to address the complex issues of rapid programme management. It provides long term confidence to the bank by guaranteeing their ownership of the system and data. The system also retains the look and feel of bank systems to give clear brand identity. Users securely access the system and navigate within it by identifying a project, viewing programme information and accessing data folders.
The traditional network boundary gap technique which can't ensure the confidentiality of information absolutely when interact the information was analyzed. This paper prompts a new technical absolution: A dual unilateral path of information interacting scheme based on unilateral transferring technique by means of partition of information flows. On one hand, this new scheme can confront the connection oriented attacks including the Trojan horse based on TCP and UDP effectively without depending on the current Trojan horse detection technology absolutely, On the other hand, the scheme can confront the data oriented attacks, that is to say, it can protect the confidentiality of the inner system data from destroying by the Trojan horse which was embedded into the inner system through other ways.
Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)