{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:40Z","timestamp":1754157220347,"version":"3.41.2"},"reference-count":12,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1999,3,1]],"date-time":"1999-03-01T00:00:00Z","timestamp":920246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,3,1]]},"abstract":"<jats:p>Two main areas of activity can be identified in the field of network security: the local area network and the common point between networks. Presents an overview of two projects concerning the above\u2010mentioned areas. While the first will concern security architectures based on active firewall components, the second presents a secure intranet solution. The combination of active firewall components with the DMZ concept can translate a security policy into reality and will result in a high level security firewall system. One of the most important security problems in an intranet is to ensure that every user has access only to the information which is relevant for his\/her work. In our project this is solved using role\u2010dependent information access for each user.<\/jats:p>","DOI":"10.1108\/10662249910251264","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"8-15","source":"Crossref","is-referenced-by-count":5,"title":["Security aspects of an enterprise\u2010wide network architecture"],"prefix":"10.1108","volume":"9","author":[{"given":"Robert","family":"Loew","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Stengel","sequence":"additional","affiliation":[]},{"given":"Udo","family":"Bleimann","sequence":"additional","affiliation":[]},{"given":"Aidan","family":"McDonald","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031019471831900_b1","unstructured":"Bauer, C. (1998, \u201cIntegration of security aspects in the intranet of the Dresdner Bauspar A\u201d, diploma thesis, FH Darmstadt\/Distributed Application Systems Laboratory."},{"key":"key2022031019471831900_b2","unstructured":"BSI (1996, Security Requirements on Internet Firewalls, Bundesamt f\u00fcr Sicherheit in der Informationstechnik.."},{"key":"key2022031019471831900_b3","unstructured":"Chapman, D.B. (1996, Building Internet Firewalls, O\u2019Reilly.."},{"key":"key2022031019471831900_b4","unstructured":"Garmhausen AG (1997, Umfrageergebnis \u2010 Firmen auf Internet\u2010Gefahren schlecht vorbereitet, Lan Line, No. 3, pp. 13."},{"key":"key2022031019471831900_b5","unstructured":"Henshall, J. (1990, OSI Explained: End\u2010To\u2010End Computer Communication Standards, Ellis Horwood, Chichester and New York, NY."},{"key":"key2022031019471831900_b6","unstructured":"Kim, E.E. (1996, CGI Developer\u2019s Guide, Sams Publishing, Carmel, IN."},{"key":"key2022031019471831900_b7","doi-asserted-by":"crossref","unstructured":"Kyas, O. (1997, Corporate Intranets, Thomson International Publishers..","DOI":"10.1049\/ic:19971022"},{"key":"key2022031019471831900_b8","unstructured":"Loew, R. (1997, \u201cConcept and prototypical realisation of an intranet solution for the Dresdner Bauspar AG\u201d, diploma thesis, FH Darmstadt\/Distributed Application Systems Laboratory.."},{"key":"key2022031019471831900_b9","unstructured":"Loew, R. (1998, \u201cSecurity aspects of an intranet solution\u201d, Proceedings, International Network Conference, University of Plymouth Conference, pp. 218\u201023."},{"key":"key2022031019471831900_b10","unstructured":"Pohlmann, N. (1997, Firewall\u2010Systems, Thomson Publishing.."},{"key":"key2022031019471831900_b11","unstructured":"Stengel, I., (1996, \u201cSecurity management in a distributed environment\u201d, Diploma Thesis, FH\u2010Darmstadt\/ Distributed Application Systems Laboratory."},{"key":"key2022031019471831900_b12","unstructured":"Stengel, I. (1998, \u201cSecurity architectures based on active firewall components\u201d, Conference Proceedings, International Network Conference, University of Plymouth, pp. 203\u201009."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662249910251264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910251264\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910251264\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:58Z","timestamp":1753400458000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/1\/8-15\/180719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,3,1]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1999,3,1]]}},"alternative-id":["10.1108\/10662249910251264"],"URL":"https:\/\/doi.org\/10.1108\/10662249910251264","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1999,3,1]]}}}