{"id":"https://openalex.org/W2033229657","doi":"https://doi.org/10.1109/milcom.2011.6127516","title":"Desktop Demilitarized Zone","display_name":"Desktop Demilitarized Zone","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2033229657","doi":"https://doi.org/10.1109/milcom.2011.6127516","mag":"2033229657"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2011.6127516","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127516","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067220939","display_name":"G. Nakamoto","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Glen Nakamoto","raw_affiliation_strings":["CISSP, MITRE Corporation, Bedford, MA, USA","MITRE Corporation,Bedford,MA,USA"],"affiliations":[{"raw_affiliation_string":"CISSP, MITRE Corporation, Bedford, MA, USA","institution_ids":["https://openalex.org/I44896327"]},{"raw_affiliation_string":"MITRE Corporation,Bedford,MA,USA","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064019479","display_name":"Jeff Schwefler","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeff Schwefler","raw_affiliation_strings":["CISSP, MITRE Corporation, Bedford, MA, USA","MITRE Corporation,Bedford,MA,USA"],"affiliations":[{"raw_affiliation_string":"CISSP, MITRE Corporation, Bedford, MA, USA","institution_ids":["https://openalex.org/I44896327"]},{"raw_affiliation_string":"MITRE Corporation,Bedford,MA,USA","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029930027","display_name":"Kenneth Palmer","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kenneth Palmer","raw_affiliation_strings":["CISSP, MITRE Corporation, Bedford, MA, USA","MITRE Corporation,Bedford,MA,USA"],"affiliations":[{"raw_affiliation_string":"CISSP, MITRE Corporation, Bedford, MA, USA","institution_ids":["https://openalex.org/I44896327"]},{"raw_affiliation_string":"MITRE Corporation,Bedford,MA,USA","institution_ids":["https://openalex.org/I44896327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067220939"],"corresponding_institution_ids":["https://openalex.org/I44896327"],"apc_list":null,"apc_paid":null,"fwci":0.7002,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71568986,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1487","last_page":"1492"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dmz","display_name":"DMZ","score":0.9374659061431885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7793763279914856},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6967560052871704},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6160122752189636},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5602817535400391},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.5496630668640137},{"id":"https://openalex.org/keywords/internet-connection-sharing","display_name":"Internet Connection Sharing","score":0.5447701811790466},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5220863223075867},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.5117616653442383},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4670969843864441},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4624045491218567},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.44185739755630493},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.43540048599243164},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4054694175720215},{"id":"https://openalex.org/keywords/internet-access","display_name":"Internet access","score":0.3658342957496643},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3098941445350647}],"concepts":[{"id":"https://openalex.org/C23103841","wikidata":"https://www.wikidata.org/wiki/Q1074209","display_name":"DMZ","level":3,"score":0.9374659061431885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7793763279914856},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6967560052871704},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6160122752189636},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5602817535400391},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.5496630668640137},{"id":"https://openalex.org/C70035269","wikidata":"https://www.wikidata.org/wiki/Q1359955","display_name":"Internet Connection Sharing","level":4,"score":0.5447701811790466},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5220863223075867},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.5117616653442383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4670969843864441},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4624045491218567},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44185739755630493},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.43540048599243164},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4054694175720215},{"id":"https://openalex.org/C83849155","wikidata":"https://www.wikidata.org/wiki/Q1472399","display_name":"Internet access","level":3,"score":0.3658342957496643},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3098941445350647}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2011.6127516","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2011.6127516","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 - MILCOM 2011 Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2476835266"],"related_works":["https://openalex.org/W2384974790","https://openalex.org/W3141320458","https://openalex.org/W1968016906","https://openalex.org/W2003511009","https://openalex.org/W2110089736","https://openalex.org/W2360990748","https://openalex.org/W2073669699","https://openalex.org/W3035284433","https://openalex.org/W2033229657","https://openalex.org/W2610428050"],"abstract_inverted_index":{"The":[0,146,315,346],"Desktop":[1,5,196],"Demilitarized":[2],"Zone":[3],"or":[4,168,226,360],"DMZ":[6,197,236,321],"project":[7,67],"uses":[8],"virtualization":[9],"technology":[10],"to":[11,18,41,72,93,133,140,149,183,200,224,253,257,291,323,331,358],"maintain":[12],"separation":[13],"of":[14,216,249,265,300],"our":[15],"network":[16,35,52,110,237],"infrastructure":[17],"appropriate":[19],"Trust":[20],"Zones":[21],"(TZ).":[22],"Using":[23],"a":[24,30,37,63,70,102,151,184,231,266,301,342],"two":[25],"TZ":[26,290,293],"concept":[27,198],"such":[28,76,206],"as":[29,77,192,207,272,274],"typical":[31],"Enterprise":[32,51,109,243,333],"and":[33,53,328,362,369],"Internet":[34,43,81,97],"model,":[36],"key":[38,247],"objective":[39],"is":[40,161,181,252,317],"prevent":[42],"activities":[44],"(web":[45],"browsing,":[46],"etc.)":[47],"from":[48,62,143,211,288,319],"impacting":[49],"the":[50,108,114,121,128,134,141,176,195,214,235,242,255,258,263,275,298,320,332,354],"vice":[54],"versa":[55],"(preventing":[56],"exfiltration,":[57],"for":[58,172,282,336],"example)":[59,173],"while":[60,85],"working":[61],"single":[64,267],"desktop.":[65],"This":[66,116],"has":[68],"created":[69],"capability":[71],"enable":[73],"user":[74,147,259],"actions":[75,205],"clicking":[78],"on":[79,86,101,113,155,175,234,241],"an":[80,87,96,193,324],"web":[82,123],"site":[83],"link":[84],"Enterprise-connected":[88,135],"computer":[89,136,179],"running":[90],"Outlook":[91],"Email":[92,209],"automatically":[94],"initiate":[95],"Explorer":[98],"(IE)":[99],"browser":[100,130],"virtual":[103],"machine":[104],"(VM)":[105],"located":[106],"outside":[107],"(for":[111],"example,":[112,194],"DMZ).":[115],"DMZ-based":[117],"VM":[118,233,322],"(after":[119],"retrieving":[120],"requested":[122],"page)":[124],"then":[125],"securely":[126,283],"\u201ctransmits\u201d":[127],"IE":[129,153,189],"window":[131,154],"back":[132,164],"with":[137,278,310],"minimal":[138],"risk":[139],"host":[142,335],"any":[144,201],"malware.":[145],"continues":[148],"see":[150],"\u201cnormal\u201d":[152],"his":[156],"machine.":[157,245],"Any":[158],"malware":[159],"that":[160,307],"potentially":[162],"brought":[163],"(zero":[165],"day":[166],"exploits":[167],"\u201cdrive":[169],"by\u201d":[170],"attacks,":[171],"remains":[174],"DMZ-connected":[177],"disposable":[178,232],"which":[180],"re-instantiated":[182],"\u201cclean":[185],"state\u201d":[186],"periodically.":[187],"While":[188],"was":[190],"used":[191],"extends":[199],"arbitrary":[202],"application":[203],"including":[204],"opening":[208],"attachments":[210,219],"Outlook.":[212],"In":[213],"case":[215],"email":[217],"messages,":[218],"can":[220,227,308],"be":[221,228],"\u201csanitized\u201d":[222],"prior":[223],"forwarding":[225],"opened":[229],"in":[230,348],"but":[238],"still":[239],"\u201cviewable\u201d":[240],"connected":[244,334],"A":[246],"focus":[248],"this":[250],"activity":[251],"minimize":[254],"impact":[256],"experience":[260],"by":[261,353],"maintaining":[262],"appearance":[264],"desktop":[268],"(vice":[269],"multiple":[270,279],"desktops":[271],"well":[273],"maintenance":[276],"associated":[277],"machines).":[280],"Provisions":[281],"transferring":[284],"content":[285],"(downloaded":[286],"objects/files)":[287],"one":[289],"another":[292],"are":[294,350,363],"also":[295],"accommodated":[296],"via":[297],"use":[299,349],"\u201csave":[302],"as\u201d":[303],"file":[304,312],"transfer":[305,337],"service":[306],"interface":[309],"external":[311],"sanitization":[313,326],"services.":[314],"object":[316,325],"moved":[318],"server":[327],"made":[329],"available":[330],"(automatically":[338],"-":[339],"pulled":[340],"into":[341],"\u201cwell":[343],"known\u201d":[344],"folder).":[345],"VMs":[347],"not":[351],"managed":[352],"users":[355],"(no":[356],"need":[357],"patch":[359],"update)":[361],"kept":[364],"current":[365],"through":[366],"central":[367],"management":[368],"differential":[370],"patching":[371],"concepts.":[372]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
