Issue No. 01 - January/February (2008 vol. 12)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2008.19
Stephen Farrell , Trinity College Dublin
Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author looks at a range of boundaries from smaller to larger and presents vulnerabilites and potential solutions for each case.
security boundaries, practical security, host virtualization, middleboxes, enterprise network boundaries, Web 2.0
Stephen Farrell, "Security Boundaries", IEEE Internet Computing, vol. 12, no. , pp. 93-96, January/February 2008, doi:10.1109/MIC.2008.19