Show simple item record

dc.contributor.authorFARRELL, STEPHENen
dc.date.accessioned2010-04-21T16:27:14Z
dc.date.available2010-04-21T16:27:14Z
dc.date.issued2008en
dc.date.submitted2008en
dc.identifier.citationStephen Farrell, Security Boundaries, IEEE Internet Computing, 12, 1, 2008, 93 - 96en
dc.identifier.otherYen
dc.identifier.urihttp://hdl.handle.net/2262/39146
dc.descriptionPUBLISHEDen
dc.description.abstractSecurity boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. In this inaugural column on practical security, boundaries from smaller to larger are discussed and a couple of vulnerabilities are described. A potential path forward to tackling such issues based on the idea of a system's attack surface.en
dc.format.extent93 - 96en
dc.language.isoenen
dc.relation.ispartofseriesIEEE Internet Computingen
dc.relation.ispartofseries12en
dc.relation.ispartofseries1en
dc.rightsYen
dc.subjectInterneten
dc.subjectData securityen
dc.titleSecurity Boundariesen
dc.typeJournal Articleen
dc.type.supercollectionscholarly_publicationsen
dc.type.supercollectionrefereed_publicationsen
dc.identifier.peoplefinderurlhttp://people.tcd.ie/sfarrel6en
dc.identifier.rssinternalid63992en
dc.identifier.rssurihttp://dx.doi.org/10.1109/MIC.2008.19en


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record