Results 31 to 40 of about 198,702 (279)
Application of Data Security Models in Zero - Trust Architecture from the Data Assets Perspectives
Today, data assets have become the core assets of enterprises and organizations, and their security is of utmost importance. The traditional network security architecture has revealed many limitations in protecting data assets, giving rise to the zero -
Fangshu Hu, Jessa Frida Festijo
doaj +1 more source
Code for sustainable homes: opportunities or threats for offsite manufacturing and mass-customization? [PDF]
This study intends to, firstly, discuss current status of zero carbon homes in the UK, and secondly, to investigate the feasibility of using offsite construction methods to deliver mass customised zero carbon homes.
Hadjri, Karim, Hashemi, Arman
core
Mechanisms for Outsourcing Computation via a Decentralized Market
As the number of personal computing and IoT devices grows rapidly, so does the amount of computational power that is available at the edge. Since many of these devices are often idle, there is a vast amount of computational power that is currently ...
Anderson D. P. +5 more
core +1 more source
The dual roles of CC and CXC chemokines in distinguishing active, latent, and subclinical tuberculosis were reviewed, along with an evaluation of their potential as diagnostic biomarkers and therapeutic targets to advance precision medicine in tuberculosis management. The graphical abstract was generated with AI assistance (Gemini 3.0).
Xuying Yin, Dangsheng Xiao, Jiezuan Yang
wiley +1 more source
Privacy-preserving authentication scheme based on zero trust architecture
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network.
Fei Tang, Chunliang Ma, Kefei Cheng
doaj +1 more source
Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture
In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending the network perimeter is no longer sufficient.
Lampis Alevizos +4 more
doaj +1 more source
Aging Is a Key Driver for Adult Acute Myeloid Leukemia
Acute myeloid leukemia (AML) is a classical ageārelated hematologic malignancy, and a key driver of AML is aging, which profoundly regulates intrinsic factors such as genomic instability, epigenetic reprogramming, and metabolic dysregulation, and alters bone marrow microenvironment.
Rong Yin, Haojian Zhang
wiley +1 more source
Research on security protection of unmanned aerial vehicle systems based on zero trust
In recent years, unmanned aerial vehicles (UAVs) have been widely used in the military and civilian fields, especially since the Russia-Ukraine conflict, their advantages of low cost and strong functions are particularly prominent and have played a huge ...
Ji Shengkai +4 more
doaj +1 more source
UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things
The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we are ...
A Ouaddah +6 more
core +1 more source
Zero Trust Container Architecture (ZTCA)
Containerisation is quickly becoming an accepted industry standard for development environments and Gartner, in a recent market forecast, estimated that by 2022 more than 75% of organisations will be using containers in production deployments. With this explosion in growth comes an added focus on security and best practices for using containers.
Darragh Leahy, Christina Thorpe
openaire +2 more sources

