Zero trust: Never trust, always verify
A Wylde - 2021 international conference on cyber situational …, 2021 - ieeexplore.ieee.org
This short paper argues that current conceptions in trust formation scholarship miss the
context of zero trust, a practice growing in importance in cyber security. The contribution of …
context of zero trust, a practice growing in importance in cyber security. The contribution of …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
UB Chaudhry, AKM Hydros - IET blockchain, 2023 - Wiley Online Library
Cyber security in the banking sector is of high importance nowadays. The rate of
cyberattacks is spiking every year, and the implementation of strong cybersecurity models is …
cyberattacks is spiking every year, and the implementation of strong cybersecurity models is …
[PDF][PDF] Zero trust in edge computing environment: a blockchain based practical scheme
D Li, E Zhang, M Lei, C Song - Mathematical Biosciences and …, 2022 - aimspress.com
Edge computing offloads the data processing capacity to the user side, provides flexible and
efficient computing services for the development of smart city, and brings many security …
efficient computing services for the development of smart city, and brings many security …
ZTEI: Zero-trust and edge intelligence empowered continuous authentication for satellite networks
P Fu, J Wu, X Lin, A Shen - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite communication technology and terrestrial infrastructure has
resulted in an un-precedented increase in network services covering the world. The main …
resulted in an un-precedented increase in network services covering the world. The main …
Secure access service edge: A zero trust based framework for accessing data securely
S Yiliyaer, Y Kim - 2022 IEEE 12th Annual Computing and …, 2022 - ieeexplore.ieee.org
With the growing demand for moving work from home, organizations need to allow more
workers to access their private networks through the employer's local Internet. This leads to …
workers to access their private networks through the employer's local Internet. This leads to …
Zero Trust Implementation in the Emerging Technologies Era: Survey
AI Weinberg, K Cohen - arXiv preprint arXiv:2401.09575, 2024 - arxiv.org
This paper presents a comprehensive analysis of the shift from the traditional perimeter
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …
Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust
UH Park, J Hong, A Kim, KH Son - Electronics, 2023 - mdpi.com
The rapid expansion of remote work following the COVID-19 pandemic has necessitated the
development of more robust and secure endpoint device security solutions. Companies …
development of more robust and secure endpoint device security solutions. Companies …
Secure mechanism of intelligent urban railway cloud platform based on zero-trust security architecture
Y Qlu - Proceedings of the 6th International Conference on …, 2022 - dl.acm.org
Aiming to strengthen the stability of operation and maintenance of the urban rail transit
network cloud platform at this stage, it is emerging to solve the security mechanism of the …
network cloud platform at this stage, it is emerging to solve the security mechanism of the …