Results 21 to 30 of about 812,870 (286)
Research on Satellite Internet Security Protection Based on Zero Trust
Satellite internet, as a new infrastructure, is an important part of China's future information infrastructure, and its security importance is self-evident.Based on the typical architecture of satellite internet system, the security risks faced by ...
Yufei SONG +3 more
doaj +2 more sources
Zero Trust Architecture (ZTA): A Comprehensive Survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space.
Naeem Firdous Syed +5 more
doaj +1 more source
ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology [PDF]
Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised.
Gutmann, Andreas +6 more
core +2 more sources
Stroke recovery and lesion reduction following acute isolated bilateral ischaemic pontine infarction : a case report [PDF]
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work ...
Dinis Fernandes, Catarina +4 more
core +3 more sources
Investor heterogeneity and the cross-section of U.K. investment trust performance [PDF]
We use the upper and lower bounds derived by Ferson and Lin (2010) to examine the impact of investor heterogeneity on the performance of U.K. investment trusts relative to alternative linear factor models.
Andrew Marshall +36 more
core +1 more source
WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno +5 more
doaj +1 more source
Blockchain-Based Zero Trust on the Edge
Internet of Things (IoT) devices pose significant security challenges due to their heterogeneity (i.e., hardware and software) and vulnerability to extensive attack surfaces. Today's conventional perimeter-based systems use credential-based authentication (e.g., username/password, certificates, etc.) to decide whether an actor can access a network ...
Bicer, Cem +3 more
openaire +3 more sources
This study seeks to explain the wide acceptance of the stringent zero-COVID policy in two Chinese societies—Mainland China (n = 2,184) and Taiwan (n = 1,128)—from perspectives of cultural values and trust.
Yi-Hui Christine Huang +3 more
doaj +1 more source
Redefining genomic privacy: trust and empowerment [PDF]
Fulfilling the promise of the genetic revolution requires the analysis of large datasets containing information from thousands to millions of participants. However, sharing human genomic data requires protecting subjects from potential harm.
Erlich, Y. +9 more
core +4 more sources
As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation,
Pushpendra Kumar Verma +4 more
doaj +1 more source

