{"id":"https://openalex.org/W2038468110","doi":"https://doi.org/10.1109/mnet.1987.6434191","title":"Technology perspective: Network security: Making the problem the solution","display_name":"Technology perspective: Network security: Making the problem the solution","publication_year":1987,"publication_date":"1987-04-01","ids":{"openalex":"https://openalex.org/W2038468110","doi":"https://doi.org/10.1109/mnet.1987.6434191","mag":"2038468110"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.1987.6434191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.1987.6434191","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091088939","display_name":"Eric E. Sumner","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eric E. Sumner","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091088939"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.21080313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":"2","first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9059000015258789,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9059000015258789,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9059000015258789,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8928705453872681},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7774158716201782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.74288010597229},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5230420827865601},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.45928215980529785},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.4540295898914337},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43804603815078735},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.41910573840141296},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.4186648726463318},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.41087907552719116},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.37556153535842896}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8928705453872681},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7774158716201782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74288010597229},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5230420827865601},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.45928215980529785},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.4540295898914337},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43804603815078735},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.41910573840141296},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.4186648726463318},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.41087907552719116},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.37556153535842896},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.1987.6434191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.1987.6434191","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2359085393","https://openalex.org/W2743151892","https://openalex.org/W2156083280","https://openalex.org/W2953105088","https://openalex.org/W1844709308","https://openalex.org/W2949495265","https://openalex.org/W2936467198","https://openalex.org/W2021087413","https://openalex.org/W4214849386"],"abstract_inverted_index":{"I":[0,11,38,46],"know":[1],"in":[2],"my":[3,22,33,40,69],"heart-of-hearts":[4],"that":[5,15,37,64,177],"computer":[6,34,88,183],"security":[7,24,89],"is":[8,65,90,118,162],"important,":[9],"but":[10,78,96],"have":[12,99],"to":[13,60,72,81,100,121,123,128,188],"admit":[14],"there":[16,133],"are":[17,134],"times":[18],"when":[19],"living":[20],"with":[21],"company's":[23],"policies":[25],"can":[26,146],"be":[27],"quite":[28],"an":[29,193,196,206],"annoyance.":[30],"For":[31],"example,":[32],"periodically":[35],"insists":[36],"change":[39],"password":[41,63,212],"every":[42,152,156,159],"few":[43],"months.":[44],"If":[45],"don't,":[47],"it":[48,74],"tells":[49],"me":[50,59],"\u201cPassword":[51],"expired,":[52],"choose":[53],"a":[54,62,129,163,211],"new":[55],"one:\u201d":[56],"and":[57,154,209],"forces":[58],"select":[61],"sufficiently":[66],"different":[67],"from":[68],"old":[70],"one":[71,199],"keep":[73],"happy.":[75],"It's":[76],"annoying,":[77],"I've":[79],"learned":[80],"accept":[82],"it.":[83],"That":[84,161],"simple":[85],"sort":[86],"of":[87,105,116,136,143,158,172,179,192,200],"something":[91],"we're":[92],"all":[93],"used":[94],"to,":[95],"now":[97],"we":[98],"face":[101,189],"the":[102,141,190,201],"additional":[103],"threat":[104],"attacks":[106],"on":[107,151,155,198],"our":[108],"networks.":[109],"In":[110],"fact,":[111],"for":[112,140],"some":[113],"people,":[114],"mistrust":[115],"networks":[117],"sufficient":[119],"justification":[120],"refuse":[122],"connect":[124],"their":[125],"host":[126],"computers":[127],"network.":[130],"Of":[131],"course,":[132],"plenty":[135],"brute":[137],"force":[138],"solutions":[139],"faint":[142],"heart.":[144],"One":[145],"put":[147],"DES":[148],"encryption":[149],"boxes":[150],"terminal":[153],"port":[157],"host.":[160],"very":[164],"expensive":[165],"solution,":[166],"especially":[167],"if":[168],"only":[169],"10":[170],"percent":[171],"your":[173],"2000":[174],"hosts":[175,203],"need":[176],"level":[178],"protection.":[180],"The":[181],"nervous":[182],"system":[184],"administrator":[185],"also":[186],"has":[187],"possibility":[191],"intruder":[194],"mounting":[195],"attack":[197],"unprotected":[202],"by":[204],"tapping":[205],"access":[207],"line":[208],"observing":[210],"being":[213],"entered.":[214]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
