Skip to search formSkip to main contentSkip to account menu

De-perimeterisation

Known as: Deperimeterization, De-perimeterised, De-perimeterization 
In information security, de-perimeterisation is the removal of a boundary between an organisation and the outside world. De-perimeterisation is… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Security Architecture (SA) is concerned with such tasks as design, development and management of secure business information… 
2010
2010
An approach based on overlay networking can lead to a novel P2P Service Platform (PSP) that Operators can fruitfully use to… 
2010
2010
I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished… 
2009
2009
For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed… 
2009
2009
In converging technologies (Roco and Bainbridge, 2003), boundaries between previously separated technologies become permeable. A… 
2009
2009
This thesis addresses the problem of achieving fine-grained and sustained control of access to electronic information, shared in… 
2008
2008
If an organisation wants to secure its IT assets, where should the security mechanisms be placed? The traditional view is the… 
Review
2006
Review
2006
  • 2006
  • Corpus ID: 17436503
Overview The concept of Unified Access Control or Network Admission Control is being talked about a great deal within the…