Results 11 to 20 of about 812,870 (286)
Dissecting zero trust: research landscape and its implementation in IoT
As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT).
Chunwen Liu +7 more
doaj +2 more sources
5G-Power-Compromised Terminal Threat Detection Based on Atomized Zero-Trust Component [PDF]
The widespread application of 5G technology in the power industry has promoted access by many power terminals to the network.However, many power terminals are exposed to the Internet, attackers can first invade vulnerable power terminals for remote ...
GU Zhimin, WANG Ziying, GUO Jing, GUO Yajuan, FENG Jingyu
doaj +1 more source
Editorial: Zero Trust based Internet of Things [PDF]
Zero trust is an emerging framework aims at enhancing the security of Internet of Things (IoT), which connects billions of smart devices. Specifically, the zero trust security shows great benefits for securing unmanaged devices that might be unable to run ...
Shancang Li
doaj +1 more source
Zero trust: Never trust, always verify [PDF]
This short paper argues that current conceptions in trust formation scholarship miss the context of zero trust, a practice growing in importance in cyber security. The contribution of this paper presents a novel approach to help conceptualize and operationalize zero trust and a call for a research agenda.
openaire +2 more sources
The case for Zero Trust Digital Forensics [PDF]
It is imperative for all stakeholders that digital forensics investigations produce reliable results to ensure the field delivers a positive contribution to the pursuit of justice across the globe. Some aspects of these investigations are inevitably contingent on trust, however this is not always explicitly considered or critically evaluated ...
Christopher Neale +4 more
openaire +3 more sources
Zero Trust Security Model for Enterprise Networks
Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within
Rania M. Habash, mahmood khalel
doaj +1 more source
Questions of Trust in Norms of Zero Trust [PDF]
Abstract. Important norms may evolve to be promoted, implemented, and enforced by policymakers; one current example is zero trust. This norm originally arose organically, as a trusted norm among cyber security practitioners. This paper explores a puzzling question; will zero trust continue to be trusted as it evolves as an enforced norm?
openaire +1 more source
Zero Trust for Cyber Resilience
The increased connectivity and potential insider threats make traditional network defense vulnerable. Instead of assuming that everything behind the security perimeter is safe, the zero-trust security model verifies every incoming request before granting access. This chapter draws attention to the cyber resilience within the zero-trust model.
Yunfei Ge, Quanyan Zhu
openaire +2 more sources
A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES [PDF]
To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and
Varun Varma Sangaraju +4 more
doaj +1 more source
A Graph-Based Approach to Address Trust and Reputation in Ubiquitous Networks [PDF]
The increasing popularity of virtual computing environments such as Cloud and Grid computing is helping to drive the realization of ubiquitous and pervasive computing.
Bochenkov, A. +4 more
core +2 more sources

