Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,530,361 papers from all fields of science
Search
Sign In
Create Free Account
Bastion host
Known as:
Bastion (disambiguation)
A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Circuit-level gateway
Cybercrime countermeasures
DMZ (computing)
Dual-homed
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Development of Firewall Optimization Model Using by Packet Filter
M. Thant
,
Kyaw Zaw Ye
,
K. Thu
,
Sidaro Sin
International Conference on Modelling and…
2016
Corpus ID: 1157062
This paper studies one particular aspect of providing communication security: firewall technology. This article provides a…
Expand
2014
2014
Demand-Provisioned Linux Containers for Private Network Access
Patrick T. Cable
LiSA
2014
Corpus ID: 5464099
System administrators are required to access the privileged, or "super-user," interfaces of computing, networking, and storage…
Expand
2012
2012
Application of proxy technology in power system operation and maintenance auditing system
Wenchao Cui
,
Changsong Zhao
,
Ling Zheng
,
Zhenwei Wang
Proceedings of 2nd International Conference on…
2012
Corpus ID: 18640275
With the in-depth development of the electric power information technology, the operation and maintenance of equipment and…
Expand
2011
2011
Internal control bastion host and security access method of internal network resources
刘赛
,
崇英哲
,
焦利
,
郑治国
2011
Corpus ID: 116365460
The invention relates to an internal control bastion host and a security access method of internal network resources. The…
Expand
Review
2002
Review
2002
Defense Plan 2: The Back-to-Back DMZ
T. Shinder
,
D. Shinder
,
M. Grasdal
2002
Corpus ID: 108030749
2000
2000
Building a Windows NT bastion host
Stefan Norberg
2000
Corpus ID: 106508682
This article presents a checklist for converting a default Windows NT installation to a bastion host. It makes little or no…
Expand
2000
2000
The Immunix Server Appliance for Securing Internet Services1
Crispin Cowan
2000
Corpus ID: 15750430
PCT No. PCT/JP84/00192 Sec. 371 Date Dec. 18, 1984 Sec. 102(e) Date Dec. 18, 1984 PCT Filed Apr. 16, 1984 PCT Pub. No. WO84/04377…
Expand
2000
2000
The Immunix Bastion Server Appliance for Security Applications1
Crispin Cowan
2000
Corpus ID: 15736851
There is a broad selection of available applications that enhance a site’s security, e.g. firewalls, VPNs, intrusion detection…
Expand
1997
1997
Simple assured bastion hosts
C. Cant
,
S. Wiseman
Proceedings 13th Annual Computer Security…
1997
Corpus ID: 2857723
It is shown how compartmented mode workstation (CMW) technology can be used as the basis of simple assured firewalls, where the…
Expand
1996
1996
Designing an academic firewall: policy, practice, and experience with SURF
M. Greenwald
,
S. Singhal
,
Jonathan Stone
,
D. Cheriton
Proceedings of Internet Society Symposium on…
1996
Corpus ID: 10753741
Corporate network firewalls are well-understood and are becoming commonplace. These firewalls establish a security perimeter that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE