Results 241 to 250 of about 198,702 (279)
Some of the next articles are maybe not open access.

Zero Trust Security in the Mist Architecture

2021
Recently, the Internet of Things (IoT) has become popular. Fog computing is suitable for the IoT because of computation offloading. We propose the mist architecture as a model of fog computing. A mist system consists of a cloud, mist, and droplets. A conventional mist architecture is premised on boundary defense by a firewall (FW).
openaire   +1 more source

Zero-trust architecture is creating a passwordless society

Network Security, 2022
Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.
openaire   +1 more source

Planning for a Zero Trust Architecture

2022
NIST Special Publication 800-207 defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to succeed in improving the ...
openaire   +1 more source

Implementing a zero trust architecture :

A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments, while enabling a hybrid workforce and partners to access resources from anywhere, at any time, from any device in support of the organization’s mission.
Oliver Borchert   +4 more
openaire   +1 more source

Zero Trust Architecture of Token Network

2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023
Po-Han Ho, Hong-Yen Chen, Tsung-Nan Lin
openaire   +1 more source

A critical analysis of Zero Trust Architecture (ZTA)

Computer Standards & Interfaces, 2022
Eduardo B. Fernández, Andrei Brazhuk
openaire   +1 more source

Zero Trust Security Architecture (ZTSA)

Journal of Artificial Intelligence & Cloud Computing
The increasing proliferation of distributed computing environments and sophisticated cyber-threats has rendered traditional perimeter-based security models insufficient, prompting organisations to adopt the Zero Trust Architecture (ZTA) paradigm. ZTA’s core tenets “never trust, always verify,” least privilege access, continuous verification, and micro-
Ravi Teja Avireneni, Sri Harsha Koner
openaire   +1 more source

A Zero Trust Architecture for Automotive Networks

SAE Technical Paper Series
<div class="section abstract"><div class="htmlview paragraph">Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to ...
Maggie E. Shipman   +3 more
openaire   +1 more source

Privacy-preserving authentication scheme based on zero trust architecture

Digital Communications and Networks, 2023
Fei Tang, Kefei Cheng
exaly  

Zero Trust Architecture in Cloud Security

Zero Trust Architecture (ZTA) represents a paradigm shift in cloud security by challenging the outdated model of implicitly trusting internal networks. Instead of assuming trust based on network location, ZTA treats every access request—whether from inside or outside the network—as potentially malicious.
Rajesh Kanna Rajendran   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy