The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a new type of search engine that allows the users to have more interaction and control of their Internet. Using the new search engine, we can treat Web pages and files on the Internet like files on our own disk directory. We can browse, organize, search, and even edit Internet files the same way as we do on our files. The proposed approach is to present the search results in a...
This paper presents a new method to find leading indicators of domestic book sales from conventional Blog information. Although Blog information is different from actual purchases, it will influence customer behaviors. They consider it would be useful for decision making of businesses and organizations. Main contributions of the paper are three fold: 1) As well as study on the US of an Internet bookstore,...
Web 2.0-based IPTV is a new Internet protocol television (IPTV) infrastructure that allows users to participate in content creation and consumption through Web-based communities that are formed based on user interests. However, there are some limitations in making users actively participate in creating and utilizing communities. First, users need to explicitly create and manage their communities....
As the Internet became a popular source of information, more and more people are using the Internet in their everyday life. Therefore, for the servers that maintain web page sites get a lot of transactions and to maintain a stable environment, a lot of web sites have more than one server for these transaction requests. A common architecture to balance the transactional load is by using a L7 switch...
In this paper, we propose identity data backup system for the digital Identity wallet (DIDW) that is a personal identity management system for the Internet. The DIDW is client side software that stores identity data such as personal profile and account (identifier and shared-secret) for logging on to the web sites that has been registered to. The DIDW provides ways of managing distributed identity...
This paper describes a new approach of enhancing textual document search and retrieval. The approach tries to take advantage of structured query languages in search and retrieval. For this purpose the semantic model of the document is created. The semantic model of the document is an ontology-like structured semantic annotation of the document that can support structured querying. This paper discusses...
The corporate network environment is evolving to integrate and synchronize with various systems. In particular, corporations can now easily share information via the Internet, and recreate it into a resource of knowledge. However, private information leakage always occurs in the course of handling data over the Web. Thus, in sharing information, we attempt to determine how much private information...
Most access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-based access control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC on the Web by storing userspsila role information. However, cookies also have some technical drawbacks. In particular, they do not always accurately...
The environment-aware communication model with respect to ultra-large-scale system senables self-growing system and its users to form a Web Ecosystem. In such an environment, the Web systems and users are habitants of same place and are aware of each other. The Web Ecosystems semantically solve the problems of users and improve their knowledge using metadata interchange among systems. In line with...
Deep web refers to the hidden portion of the WWW (World Wide Web) which cannot be accessed directly. One of the important issues in the WWW is how to search the hidden Web. Several techniques have been proposed in order to address this issue. In this paper, we have surveyed the current problems of retrieving information from hidden Web and proposed a solution to solve these problems using probability,...
In this paper, we propose a client side identity management solution. The proposed system provides user registration and profile submission in very convenient manner. Web site login and profile update are also performed conveniently. In the proposed system, a client software called user identity manager provides identity management function a site card is generated for each id that is registered in...
Nowadays the E-commerce concept got widespread wide spread occurrence, today it is not only Web stores, but also various kinds of informational services and advertisement turnover. By growing of varieties sites competition grows too and Web technologies, that allows broadening functionality of Web applications and becoming more attractive, are evolve too. Now Web 2.0 concept is on everybody lips,...
In user-centric identity management, user select IDP. There is no relationship between the IDP and the relying web site. To evaluate the credential presented by a user and issued by the IDP, the relying web site has to decide to trust the issuer IDP. As the types of identity information provided by IDPs are various, it is very difficult for a TTP to gather and manage trust of all kinds of IDP. To...
In this paper, we propose a method for preventing the personal information leakage that is considered as a severe problem. The main ways of the personal information leakage are the leakage of the personal information registered in Web site, the Internet Phishing, the spyware. In our method, all the network packet that is sent to the outer entity from the user pc are monitored if they contain any personal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.