[9475] in cryptography@c2.net mail archive
Re: New encryption technology closes WLAN security loopholes
daemon@ATHENA.MIT.EDU (ji@research.att.com)
Mon Sep 24 19:40:47 2001
Date: Mon, 24 Sep 2001 18:44:18 -0400 (EDT)
Message-Id: <200109242244.SAA19207@bual.research.att.com>
From: ji@research.att.com
To: cryptography@wasabisystems.com
> Or in other words, the first requirement for perimeter security is a perimeter.
In increasingly many environments, the term "perimeter" makes little sense.
See, for example, the CCS-2000 paper on Distributed Firewalls by Sotiris
Ioannidis et al. You can get it (among other places) from
http://www.research.att.com/~smb/papers/ccs-df.pdf
/ji
(for the curious, the Ioannidis on that paper is my brother, not I).
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com