Results 241 to 250 of about 812,870 (286)
Some of the next articles are maybe not open access.
The Arrival of Zero Trust: What Does it Mean?
Queue, 2022It used to be that enterprise cybersecurity was all castle and moat. First, secure the perimeter and then, in terms of what went on inside that, Trust, but verify. The perimeter, of course, was the corporate network. But what does that even mean at this point? With most employees now working from home at least some of the time and organizations relying
Michael Loftus +3 more
openaire +1 more source
Zero-knowledge trust negotiation
2009 13th International Conference on Computer Supported Cooperative Work in Design, 2009Electronic business or on-line cooperation transactions happen regularly over the internet. Such a transaction usually involves a service provider who provides a certain service (i.e., perform an on-line purchase) and a service requester who requests the service.
Bo Wang, Ruizhong Wei
openaire +1 more source
2021
So far, we’ve introduced the history of Zero Trust, provided our perspective on it, and introduced its core set of principles. Zero Trust is a philosophy that can support many different types of architectures (and many, many different types of commercial products).
Jason Garbis, Jerry W. Chapman
openaire +1 more source
So far, we’ve introduced the history of Zero Trust, provided our perspective on it, and introduced its core set of principles. Zero Trust is a philosophy that can support many different types of architectures (and many, many different types of commercial products).
Jason Garbis, Jerry W. Chapman
openaire +1 more source
2021
Now that we’ve introduced the principles of Zero Trust and examined several models, let’s look at some real-world examples of Zero Trust systems. Two of these—Google’s BeyondCorp and the PagerDuty Zero Trust system—have been publicly described, and are good examples of Zero Trust architectures and systems, implemented internally at two very different ...
Jason Garbis, Jerry W. Chapman
openaire +1 more source
Now that we’ve introduced the principles of Zero Trust and examined several models, let’s look at some real-world examples of Zero Trust systems. Two of these—Google’s BeyondCorp and the PagerDuty Zero Trust system—have been publicly described, and are good examples of Zero Trust architectures and systems, implemented internally at two very different ...
Jason Garbis, Jerry W. Chapman
openaire +1 more source
5G zero trust – A Zero-Trust Architecture for Telecom
Ericsson Technology Review, 2021Jonathan Olsson +3 more
openaire +1 more source
Zero trust cybersecurity: Critical success factors and A maturity assessment framework
Computers and Security, 2023William Yeoh, Marina Liu, Malcolm Shore
exaly
Security of Zero Trust Networks in Cloud Computing: A Comparative Review
Sustainability, 2022sirshak sarkar +2 more
exaly

