Zero trust: Never trust, always verify

A Wylde - 2021 international conference on cyber situational …, 2021 - ieeexplore.ieee.org
This short paper argues that current conceptions in trust formation scholarship miss the
context of zero trust, a practice growing in importance in cyber security. The contribution of …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm

UB Chaudhry, AKM Hydros - IET blockchain, 2023 - Wiley Online Library
Cyber security in the banking sector is of high importance nowadays. The rate of
cyberattacks is spiking every year, and the implementation of strong cybersecurity models is …

[PDF][PDF] Zero trust in edge computing environment: a blockchain based practical scheme

D Li, E Zhang, M Lei, C Song - Mathematical Biosciences and …, 2022 - aimspress.com
Edge computing offloads the data processing capacity to the user side, provides flexible and
efficient computing services for the development of smart city, and brings many security …

零信任网络综述.

诸葛程晨, 王群, 刘家银… - Journal of Computer …, 2022 - search.ebscohost.com
针对目前网络安全形势日益严峻的问题, 零信任网络给出了一种能够有效缓解传统网络安全威胁
的架构及其设计与实现方法. 零信任的核心思想是“永不信任, 始终验证”, 零信任网络是在传统 …

ZTEI: Zero-trust and edge intelligence empowered continuous authentication for satellite networks

P Fu, J Wu, X Lin, A Shen - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite communication technology and terrestrial infrastructure has
resulted in an un-precedented increase in network services covering the world. The main …

Secure access service edge: A zero trust based framework for accessing data securely

S Yiliyaer, Y Kim - 2022 IEEE 12th Annual Computing and …, 2022 - ieeexplore.ieee.org
With the growing demand for moving work from home, organizations need to allow more
workers to access their private networks through the employer's local Internet. This leads to …

Zero Trust Implementation in the Emerging Technologies Era: Survey

AI Weinberg, K Cohen - arXiv preprint arXiv:2401.09575, 2024 - arxiv.org
This paper presents a comprehensive analysis of the shift from the traditional perimeter
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …

Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust

UH Park, J Hong, A Kim, KH Son - Electronics, 2023 - mdpi.com
The rapid expansion of remote work following the COVID-19 pandemic has necessitated the
development of more robust and secure endpoint device security solutions. Companies …

Secure mechanism of intelligent urban railway cloud platform based on zero-trust security architecture

Y Qlu - Proceedings of the 6th International Conference on …, 2022 - dl.acm.org
Aiming to strengthen the stability of operation and maintenance of the urban rail transit
network cloud platform at this stage, it is emerging to solve the security mechanism of the …