Results 11 to 20 of about 198,702 (277)
Investigating SRAM PUFs in large CPUs and GPUs [PDF]
Physically unclonable functions (PUFs) provide data that can be used for cryptographic purposes: on the one hand randomness for the initialization of random-number generators; on the other hand individual fingerprints for unique identification of ...
Bernstein, Daniel J. +2 more
core +5 more sources
Zero-Trust Model for Smart Manufacturing Industry
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to
Biplob Paul, Muzaffar Rao
doaj +1 more source
Research on Satellite Internet Security Protection Based on Zero Trust
Satellite internet, as a new infrastructure, is an important part of China's future information infrastructure, and its security importance is self-evident.Based on the typical architecture of satellite internet system, the security risks faced by ...
Yufei SONG +3 more
doaj +2 more sources
Application protection in 5G cloud network using zero trust architecture
Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was
Guofeng HE
doaj +2 more sources
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
Design for sustainable architecture and environments [PDF]
This paper describes some of the research outcomes of a Knowledge Transfer Partnership (KTP) project partly funded by Department of Trade and Industry, UK.
Fieldson, Rosemary +2 more
core +1 more source
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments [PDF]
Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial.
Danezis, George +3 more
core +4 more sources
Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem +2 more
core +2 more sources
3PAC: Enforcing Access Policies for Web Services [PDF]
Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.
Bemmel, J. van +2 more
core +2 more sources
As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation,
Pushpendra Kumar Verma +4 more
doaj +1 more source

