De-perimeterization: How to make it a reality in a cost-effective way
Paper in proceeding, 2008

Security in this rapidly changing computing world is always facing tough challenges for various reasons. Mass improvement of firewall architectures, intrusion detection systems, different types of routers, secure protocols have failed to meet the business demands of the organizations that face De-perimeterization. This inevitable fact is pointed out by Jericho Forum, a consortium of customers that tries to come up with security strategies and make them adopted by vendors. Throughout this paper, there will be a brief overview of De-perimeterization implications, then the discussion will focus on security architectures and models that tend to reach that concept and also its implementation possibility in the developing nation by means of cost-effective way.

network

de-perimterization

Author

Sheikh Mahbub Habib

jakob cyril

Tomas Olovsson

Chalmers, Computer Science and Engineering (Chalmers), Networks and Systems (Chalmers)

Acia Pacific Networking Group APNG 10th Camp 2008

Areas of Advance

Information and Communication Technology

Subject Categories

Computer and Information Science

More information

Created

10/8/2017