Results 21 to 30 of about 198,702 (277)

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES [PDF]

open access: yesProceedings on Engineering Sciences
To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and
Varun Varma Sangaraju   +4 more
doaj   +1 more source

Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture

open access: yesApplied Sciences, 2021
Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even ...
Dan Tyler, Thiago Viana
doaj   +1 more source

Open-Source, Open-Architecture SoftwarePlatform for Plug-InElectric Vehicle SmartCharging in California [PDF]

open access: yes, 2020
This interdisciplinary eXtensible Building Operating System–Vehicles project focuses on controlling plug-in electric vehicle charging at residential and small commercial settings using a novel and flexible open-source, open-architecture charge ...
Callaway, Duncan   +3 more
core  

A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model

open access: yesSensors
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the shortcomings of standard network security solutions. This extensive survey study provides a meticulous explanation of the underlying principles of Zero Trust, as well
Poonam Dhiman   +6 more
doaj   +1 more source

Dynamic Trust Federation in Grids

open access: yes, 2006
Grids are becoming economically viable and productive tools. Grids provide a way of utilizing a vast array of linked resources such as computing systems, databases and services online within Virtual Organizations (VO). However, today’s Grid architectures
Ahsant, M.   +4 more
core   +2 more sources

Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks [PDF]

open access: yes中国工程科学
The unique position of near space makes its network, centered around various near-space vehicles, a critical component of the integrated air-space-ground network.
Qiao Liu   +4 more
doaj   +1 more source

Transparent code authentication at the processor level [PDF]

open access: yes, 2009
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim   +32 more
core   +2 more sources

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Application of Data Security Models in Zero - Trust Architecture from the Data Assets Perspectives

open access: yesDiversitas Journal
Today, data assets have become the core assets of enterprises and organizations, and their security is of utmost importance. The traditional network security architecture has revealed many limitations in protecting data assets, giving rise to the zero -
Fangshu Hu, Jessa Frida Festijo
doaj   +1 more source

Home - About - Disclaimer - Privacy