Security Boundaries. Farrell, S. IEEE Internet Computing (INTERNET), 12(1):93-96, 2008. Paper bibtex @article{ dblp3253016,
title = {Security Boundaries},
author = {Stephen Farrell},
author_short = {Farrell, S.},
bibtype = {article},
type = {article},
year = {2008},
key = {dblp3253016},
id = {dblp3253016},
biburl = {http://www.dblp.org/rec/bibtex/journals/internet/Farrell08},
url = {http://doi.ieeecomputersociety.org/10.1109/MIC.2008.19},
journal = {IEEE Internet Computing (INTERNET)},
pages = {93-96},
number = {1},
volume = {12},
text = {IEEE Internet Computing (INTERNET) 12(1):93-96 (2008)}
}
Downloads: 0
{"_id":{"_str":"52ba01e39eb585cc2600502b"},"__v":5,"authorIDs":["54704c3c5ac8e5e30d00058f"],"author_short":["Farrell, S."],"bibbaseid":"farrell-securityboundaries-2008","bibdata":{"title":"Security Boundaries","author":["Stephen Farrell"],"author_short":["Farrell, S."],"bibtype":"article","type":"article","year":"2008","key":"dblp3253016","id":"dblp3253016","biburl":"http://www.dblp.org/rec/bibtex/journals/internet/Farrell08","url":"http://doi.ieeecomputersociety.org/10.1109/MIC.2008.19","journal":"IEEE Internet Computing (INTERNET)","pages":"93-96","number":"1","volume":"12","text":"IEEE Internet Computing (INTERNET) 12(1):93-96 (2008)","bibtex":"@article{ dblp3253016,\n title = {Security Boundaries},\n author = {Stephen Farrell},\n author_short = {Farrell, S.},\n bibtype = {article},\n type = {article},\n year = {2008},\n key = {dblp3253016},\n id = {dblp3253016},\n biburl = {http://www.dblp.org/rec/bibtex/journals/internet/Farrell08},\n url = {http://doi.ieeecomputersociety.org/10.1109/MIC.2008.19},\n journal = {IEEE Internet Computing (INTERNET)},\n pages = {93-96},\n number = {1},\n volume = {12},\n text = {IEEE Internet Computing (INTERNET) 12(1):93-96 (2008)}\n}","bibbaseid":"farrell-securityboundaries-2008","role":"author","urls":{"Paper":"http://doi.ieeecomputersociety.org/10.1109/MIC.2008.19"},"downloads":0},"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/internet/Farrell08","downloads":0,"keywords":[],"search_terms":["security","boundaries","farrell"],"title":"Security Boundaries","year":2008,"dataSources":["BiST6fvwa2wAQDody"]}