{"id":"https://openalex.org/W2076633761","doi":"https://doi.org/10.1108/10662249910251264","title":"Security aspects of an enterprise\u2010wide network architecture","display_name":"Security aspects of an enterprise\u2010wide network architecture","publication_year":1999,"publication_date":"1999-03-01","ids":{"openalex":"https://openalex.org/W2076633761","doi":"https://doi.org/10.1108/10662249910251264","mag":"2076633761"},"language":"en","primary_location":{"id":"doi:10.1108/10662249910251264","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662249910251264","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066210374","display_name":"Robert Loew","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Robert Loew","raw_affiliation_strings":["Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: robert@loew.com and ingo@stengel.com Aidan McDonald is a Lecturer in the Department of Mathematics a","(Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: robert@loew.com and ingo@stengel.com Aidan McDonald is a Lecturer in the Department of Mathematics a)"],"affiliations":[{"raw_affiliation_string":"Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: robert@loew.com and ingo@stengel.com Aidan McDonald is a Lecturer in the Department of Mathematics a","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"(Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: robert@loew.com and ingo@stengel.com Aidan McDonald is a Lecturer in the Department of Mathematics a)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032961897","display_name":"Ingo Stengel","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ingo Stengel","raw_affiliation_strings":["Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: ingo@stengel.com","(Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: ingo@stengel.com)"],"affiliations":[{"raw_affiliation_string":"Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: ingo@stengel.com","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"(Researcher, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail: ingo@stengel.com)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008047608","display_name":"Udo Bleimann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Udo Bleimann","raw_affiliation_strings":["Professor, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail:","(Professor, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail:)"],"affiliations":[{"raw_affiliation_string":"Professor, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail:","institution_ids":[]},{"raw_affiliation_string":"(Professor, Department of Computer Science at the University of Applied Sciences, Darmstadt, Germany. E\u2010mail:)","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071425955","display_name":"A.B. McDonald","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]},{"id":"https://openalex.org/I135458274","display_name":"Citigroup","ror":"https://ror.org/032xgdx47","country_code":"US","type":"other","lineage":["https://openalex.org/I135458274"]}],"countries":["IE","US"],"is_corresponding":false,"raw_author_name":"Aidan McDonald","raw_affiliation_strings":["Lecturer, Department of Mathematics and Computing at Cork Institute of Technology, Ireland. E\u2010mail: amcdonald@cit.ie","(Lecturer, Department of Mathematics and Computing at Cork Institute of Technology, Ireland. E\u2010mail: amcdonald@cit.ie)"],"affiliations":[{"raw_affiliation_string":"Lecturer, Department of Mathematics and Computing at Cork Institute of Technology, Ireland. E\u2010mail: amcdonald@cit.ie","institution_ids":["https://openalex.org/I135458274"]},{"raw_affiliation_string":"(Lecturer, Department of Mathematics and Computing at Cork Institute of Technology, Ireland. E\u2010mail: amcdonald@cit.ie)","institution_ids":["https://openalex.org/I4210100923"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066210374"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.17105108,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"1","first_page":"8","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9266999959945679,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9266999959945679,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.906499981880188,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dmz","display_name":"DMZ","score":0.8769100308418274},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8575094938278198},{"id":"https://openalex.org/keywords/intranet","display_name":"Intranet","score":0.7213321924209595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7205458879470825},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.6726897954940796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6669214367866516},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.5575272440910339},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5491117835044861},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5186100006103516},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5020897388458252},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4904155433177948},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.43531137704849243},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.42903149127960205},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42532384395599365},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4105077087879181},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.3992060422897339},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.39915940165519714},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.36639291048049927},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.35478514432907104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3514334559440613},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.3102823793888092},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26179641485214233},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1907474398612976},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1375158429145813},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10214671492576599}],"concepts":[{"id":"https://openalex.org/C23103841","wikidata":"https://www.wikidata.org/wiki/Q1074209","display_name":"DMZ","level":3,"score":0.8769100308418274},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8575094938278198},{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.7213321924209595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7205458879470825},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.6726897954940796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6669214367866516},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.5575272440910339},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5491117835044861},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5186100006103516},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5020897388458252},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4904155433177948},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.43531137704849243},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.42903149127960205},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42532384395599365},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4105077087879181},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.3992060422897339},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.39915940165519714},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.36639291048049927},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.35478514432907104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3514334559440613},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.3102823793888092},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26179641485214233},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1907474398612976},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1375158429145813},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10214671492576599},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/10662249910251264","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662249910251264","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1496979250","https://openalex.org/W1572557641","https://openalex.org/W2185346372","https://openalex.org/W2912183746","https://openalex.org/W4254869543"],"related_works":["https://openalex.org/W2382066006","https://openalex.org/W2370543097","https://openalex.org/W2393991738","https://openalex.org/W2350169308","https://openalex.org/W2235971147","https://openalex.org/W2387980839","https://openalex.org/W2371002765","https://openalex.org/W2394481129","https://openalex.org/W2340745147","https://openalex.org/W577568228"],"abstract_inverted_index":{"Two":[0],"main":[1],"areas":[2],"of":[3,11,27,55,81],"activity":[4],"can":[5,63],"be":[6],"identified":[7],"in":[8,73,87],"the":[9,14,19,31,35,46,60,82,100],"field":[10],"network":[12,17],"security:":[13],"local":[15],"area":[16],"and":[18,70],"common":[20],"point":[21],"between":[22],"networks.":[23],"Presents":[24],"an":[25,88],"overview":[26],"two":[28],"projects":[29],"concerning":[30],"above\u2010mentioned":[32],"areas.":[33],"While":[34],"first":[36],"will":[37,71],"concern":[38],"security":[39,66,77,85],"architectures":[40],"based":[41],"on":[42],"active":[43,56],"firewall":[44,57,78],"components,":[45],"second":[47],"presents":[48],"a":[49,65,74],"secure":[50],"intranet":[51,89],"solution.":[52],"The":[53],"combination":[54],"components":[58],"with":[59],"DMZ":[61],"concept":[62],"translate":[64],"policy":[67],"into":[68],"reality":[69],"result":[72],"high":[75],"level":[76],"system.":[79],"One":[80],"most":[83],"important":[84],"problems":[86],"is":[90,103,112],"to":[91,99],"ensure":[92],"that":[93],"every":[94],"user":[95],"has":[96],"access":[97,117],"only":[98],"information":[101,116],"which":[102],"relevant":[104],"for":[105,118],"his/her":[106],"work.":[107],"In":[108],"our":[109],"project":[110],"this":[111],"solved":[113],"using":[114],"role\u2010dependent":[115],"each":[119],"user.":[120]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
