Results 1 to 10 of about 198,603 (180)

A Comprehensive Framework for Migrating to Zero Trust Architecture

open access: yesIEEE Access, 2023
Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve.
Pacharee Phiayura, Songpon Teerakanok
doaj   +4 more sources

Zero Trust Architecture (ZTA): A Comprehensive Survey

open access: yesIEEE Access, 2022
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space.
Naeem Firdous Syed   +5 more
doaj   +4 more sources

ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

open access: yesIEEE Access, 2023
Recently, zero trust security has received notable attention in the security community. However, while many networks use monitoring and security functions like firewalls, their integration in the design of zero trust architectures remains largely ...
Leonard Bradatsch   +2 more
doaj   +3 more sources

Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

open access: yesEnergy Reports, 2022
Zero Trust Network Architecture implementation is gaining popularity in the ICT sector to defend and deter cyber threats or cyber crime. Considering the architecture’s ability, it is unlikely that a single compromised endpoint in the zero-trust networks ...
Annamalai Alagappan   +2 more
doaj   +3 more sources

Quantum-resilient cross-trust evaluation for zero trust 5G security [PDF]

open access: yesScientific Reports
The growing complexity of multi-domain 5G networks exposes critical trust and authentication vulnerabilities that traditional security models cannot address, especially against emerging quantum-era threats. In this paper, we propose the Quantum-Resilient
K. Jeysuriya   +2 more
doaj   +2 more sources

Zero Trust Architecture for 6G Security

open access: yesIEEE Network
The upcoming sixth generation (6G) network is envisioned to be more open and heterogeneous than earlier generations. This challenges conventional security architectures, which typically rely on the construction of a security perimeter at network boundaries.
Xu Chen, Wei Feng, Ning Ge
exaly   +3 more sources

Securing the Metaverse: A Blockchain-Enabled Zero-Trust Architecture for Virtual Environments

open access: yesIEEE Access
In order to improve cybersecurity in newly developed network infrastructures, this research investigates the integration of blockchain technology with zero-trust security concepts. The zero-trust paradigm ensures continuous authentication across entities,
Ikram Ud Din   +4 more
doaj   +3 more sources

An intelligent zero trust secure framework for software defined networking [PDF]

open access: yesPeerJ Computer Science, 2023
Software-defined networking (SDN) faces many of the same security threats as traditional networks. The separation of the SDN control plane and data plane makes the controller more vulnerable to cyber attacks.
Xian Guo   +5 more
doaj   +2 more sources

Migrating to Zero Trust Architecture: Reviews and Challenges [PDF]

open access: yesSecurity and Communication Networks, 2021
Zero trust (ZT) is a new concept involving the provisioning of enterprise/organization resources to the subjects without relying on any implicit trust. Unlike the perimeter-based architecture in which any subject behind the wall (i.e., inside the predefined perimeter) is considered trusted, zero trust architecture (ZTA) processes any request and ...
Songpon Teerakanok   +2 more
openaire   +1 more source

5G-Power-Compromised Terminal Threat Detection Based on Atomized Zero-Trust Component [PDF]

open access: yesJisuanji gongcheng, 2023
The widespread application of 5G technology in the power industry has promoted access by many power terminals to the network.However, many power terminals are exposed to the Internet, attackers can first invade vulnerable power terminals for remote ...
GU Zhimin, WANG Ziying, GUO Jing, GUO Yajuan, FENG Jingyu
doaj   +1 more source

Home - About - Disclaimer - Privacy