Security Boundaries

  • Authors:
  • Stephen Farrell

  • Affiliations:
  • Trinity College Dublin

  • Venue:
  • IEEE Internet Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data “crosses” each one. In his inaugural column, the author looks at a range of boundaries from smaller to larger and presents vulnerabilites and potential solutions for each case.