Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,190,175 papers from all fields of science
Search
Sign In
Create Free Account
De-perimeterisation
Known as:
Deperimeterization
, De-perimeterised
, De-perimeterization
Expand
In information security, de-perimeterisation is the removal of a boundary between an organisation and the outside world. De-perimeterisation is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Collaboration-oriented architecture
Encryption
Firewall (computing)
Information security
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Security Architecture in a Collaborative De-Perimeterised Environment: Factors of Success
Yulia Cherdantseva
,
O. Rana
,
Jeremy Hilton
2011
Corpus ID: 2708970
Security Architecture (SA) is concerned with such tasks as design, development and management of secure business information…
Expand
2010
2010
The Inner Circle: How to exploit autonomic overlays of virtual resources for creating service ecosystems
A. Manzalini
,
R. Minerva
,
C. Moiso
International Conference on Intelligence in Next…
2010
Corpus ID: 18164820
An approach based on overlay networking can lead to a novel P2P Service Platform (PSP) that Operators can fruitfully use to…
Expand
2010
2010
Business to Business Data Sharing using Trusted Computing
S.S. Khan
2010
Corpus ID: 168459748
I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished…
Expand
2009
2009
Rethinking De-Perimeterisation: Problem Analysis And Solutions
van André Cleeff
,
R. Wieringa
2009
Corpus ID: 16074915
For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed…
Expand
2009
2009
Converging technologies and de-perimeterisation : towards risky active insulation
W. Pieters
2009
Corpus ID: 60649908
In converging technologies (Roco and Bainbridge, 2003), boundaries between previously separated technologies become permeable. A…
Expand
2009
2009
Advanced access control in support and distributed collaborative working and de-perimeterization
P. Burnap
2009
Corpus ID: 29970112
This thesis addresses the problem of achieving fine-grained and sustained control of access to electronic information, shared in…
Expand
2008
2008
De-perimeterisation as a cycle: tearing down and rebuilding security perimeters
C. André
,
R. Wieringa
2008
Corpus ID: 16542624
If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the…
Expand
2007
2007
Borders: Our changing network borders
Bruce Potter
2007
Corpus ID: 63619241
Review
2006
Review
2006
Unified Access and Application Delivery Methodology : A New Paradigm in Information Security and Network Architecture
2006
Corpus ID: 17436503
Overview The concept of Unified Access Control or Network Admission Control is being talked about a great deal within the…
Expand
Review
2005
Review
2005
De-Perimeterisation: Benefits and limitations
G. Palmer
Information Security Technical Report
2005
Corpus ID: 205493287
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE