dc.contributor.author | FARRELL, STEPHEN | en |
dc.date.accessioned | 2010-04-21T16:27:14Z | |
dc.date.available | 2010-04-21T16:27:14Z | |
dc.date.issued | 2008 | en |
dc.date.submitted | 2008 | en |
dc.identifier.citation | Stephen Farrell, Security Boundaries, IEEE Internet Computing, 12, 1, 2008, 93 - 96 | en |
dc.identifier.other | Y | en |
dc.identifier.uri | http://hdl.handle.net/2262/39146 | |
dc.description | PUBLISHED | en |
dc.description.abstract | Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. In this inaugural column on practical security, boundaries from smaller to larger are discussed and a couple of vulnerabilities are described. A potential path forward to tackling such issues based on the idea of a system's attack surface. | en |
dc.format.extent | 93 - 96 | en |
dc.language.iso | en | en |
dc.relation.ispartofseries | IEEE Internet Computing | en |
dc.relation.ispartofseries | 12 | en |
dc.relation.ispartofseries | 1 | en |
dc.rights | Y | en |
dc.subject | Internet | en |
dc.subject | Data security | en |
dc.title | Security Boundaries | en |
dc.type | Journal Article | en |
dc.type.supercollection | scholarly_publications | en |
dc.type.supercollection | refereed_publications | en |
dc.identifier.peoplefinderurl | http://people.tcd.ie/sfarrel6 | en |
dc.identifier.rssinternalid | 63992 | en |
dc.identifier.rssuri | http://dx.doi.org/10.1109/MIC.2008.19 | en |