Results 241 to 250 of about 198,702 (277)
Some of the next articles are maybe not open access.
Zero Trust Security in the Mist Architecture
2021Recently, the Internet of Things (IoT) has become popular. Fog computing is suitable for the IoT because of computation offloading. We propose the mist architecture as a model of fog computing. A mist system consists of a cloud, mist, and droplets. A conventional mist architecture is premised on boundary defense by a firewall (FW).
openaire +1 more source
Zero-trust architecture is creating a passwordless society
Network Security, 2022Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.
openaire +1 more source
Planning for a Zero Trust Architecture
2022NIST Special Publication 800-207 defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to succeed in improving the ...
openaire +1 more source
Implementing a zero trust architecture :
A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments, while enabling a hybrid workforce and partners to access resources from anywhere, at any time, from any device in support of the organization’s mission.Oliver Borchert +4 more
openaire +1 more source
Zero Trust Architecture of Token Network
2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023Po-Han Ho, Hong-Yen Chen, Tsung-Nan Lin
openaire +1 more source
A critical analysis of Zero Trust Architecture (ZTA)
Computer Standards & Interfaces, 2022Eduardo B. Fernández, Andrei Brazhuk
openaire +1 more source
Zero Trust Security Architecture (ZTSA)
Journal of Artificial Intelligence & Cloud ComputingThe increasing proliferation of distributed computing environments and sophisticated cyber-threats has rendered traditional perimeter-based security models insufficient, prompting organisations to adopt the Zero Trust Architecture (ZTA) paradigm. ZTA’s core tenets “never trust, always verify,” least privilege access, continuous verification, and micro-
Ravi Teja Avireneni, Sri Harsha Koner
openaire +1 more source
A Zero Trust Architecture for Automotive Networks
SAE Technical Paper Series<div class="section abstract"><div class="htmlview paragraph">Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper outlines the strategies and challenges of implementing an automotive Zero Trust Architecture (ZTA) to ...
Maggie E. Shipman +3 more
openaire +1 more source
Privacy-preserving authentication scheme based on zero trust architecture
Digital Communications and Networks, 2023Fei Tang, Kefei Cheng
exaly
A continuous authentication protocol without trust authority for zero trust architecture
China Communications, 2022Xianwei Zhou, Fuhong Lin
exaly

