Theory and Application of Zero Trust Security: A Brief Survey [PDF]
As cross-border access becomes more frequent, traditional perimeter-based network security models can no longer cope with evolving security requirements.
Hongzhaoning Kang +4 more
doaj +4 more sources
A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model [PDF]
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well
Poonam Dhiman +6 more
doaj +4 more sources
Research on Medical Security System Based on Zero Trust [PDF]
With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close.
Zhiqiang Wang +4 more
doaj +4 more sources
Beyond Zero Trust: Trust Is a Vulnerability [PDF]
Trust is a vulnerability and, like all vulnerabilities, should be eliminated. Zero trust is a systemic approach to information security that trusts no user, transaction, or network traffic unless verified.
Mark Campbell
exaly +2 more sources
A Comprehensive Framework for Migrating to Zero Trust Architecture
Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve.
Pacharee Phiayura, Songpon Teerakanok
doaj +3 more sources
An intelligent zero trust secure framework for software defined networking [PDF]
Software-defined networking (SDN) faces many of the same security threats as traditional networks. The separation of the SDN control plane and data plane makes the controller more vulnerable to cyber attacks.
Xian Guo +5 more
doaj +3 more sources
Healthcare and Cybersecurity: Taking a Zero Trust Approach [PDF]
This article looks at Healthcare and the issues that exist with current cybersecurity measures. As hacks including ransomware attacks become more commonplace it is important to provide safeguards to protect the data of the patients and the healthcare ...
George Vukotich
doaj +2 more sources
ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture
Recently, zero trust security has received notable attention in the security community. However, while many networks use monitoring and security functions like firewalls, their integration in the design of zero trust architectures remains largely ...
Leonard Bradatsch +2 more
doaj +3 more sources
Quantum-resilient cross-trust evaluation for zero trust 5G security [PDF]
The growing complexity of multi-domain 5G networks exposes critical trust and authentication vulnerabilities that traditional security models cannot address, especially against emerging quantum-era threats. In this paper, we propose the Quantum-Resilient
K. Jeysuriya +2 more
doaj +2 more sources
Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments [PDF]
The Internet has been vulnerable to several attacks as it has expanded, including spoofing, viruses, malicious code attacks, and Distributed Denial of Service (DDoS).
Fiza Ashfaq +4 more
doaj +2 more sources

