[1]
C. Griffy-Brown, D. Lazarikos, and M. Chun, “How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center”, JABE, vol. 18, no. 1, Mar. 2016.