Results 91 to 100 of about 773 (179)

Theory and Application of Zero Trust Security: A Brief Survey. [PDF]

open access: yesEntropy (Basel), 2023
Kang H, Liu G, Wang Q, Meng L, Liu J.
europepmc   +1 more source

The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations

open access: yesIEEE Access
This study examines the viability of Zero Trust (ZT) models, a burgeoning measure of cybersecurity, in different cultural contexts. The ZT security model is based on the principle of “never trust, always verify” and, unlike traditional ...
Bader Zyoud, Syaheerah Lebai Lutfi
doaj   +1 more source

A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems

open access: yesIEEE Access
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani   +1 more
doaj   +1 more source

Towards 5G Zero Trusted Air Interface Architecture

open access: yes, 2022
5G is destined to be supporting large deployment of Industrial IoT (IIoT) with the characteristics of ultra-high densification and low latency. 5G utilizes a more intelligent architecture, with Radio Access Networks (RANs) no longer constrained by base ...
Fung, Eddy   +5 more
core  

Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments

open access: yesIEEE Open Journal of the Communications Society
The widespread use of the Internet and the rapid growth of edge devices have increased the cyber-attack surface for these devices in Information and Communication Technologies (ICT).
Shahid Mahmood   +5 more
doaj   +1 more source

Case Study: The Next Generation of Network Management - AI, Automation, and Security in a Connected World [PDF]

open access: yes
Modern data center networks face unprecedented challenges in ensuring robust security due to the evolving complexity of cyber threats and the increasing sophistication of attack vectors.
Vaishali Nagpure
core   +2 more sources

IRMAOC: an interpretable role mining algorithm based on overlapping clustering

open access: yesCybersecurity
The Industrial Internet motivates the research and development of Zero-Trust Architecture (ZTA). Role-Based Access Control (RBAC) as one of the key technologies for ZTA has become a hot topic. Role mining algorithms are crucial for RBAC and interpretable
Yaqi Yang   +5 more
doaj   +1 more source

Enhancing user authentication and security in metaverse: a review of innovative techniques and the role of zero-trust models

open access: yesFrontiers in Virtual Reality
Metaverse is a paradigm where people can interact in virtual environments using current technologies. The Metaverse is being advanced by artificial intelligence (AI) as it develops.
Jeevalatha Ethiraj, Vijayan Ellapan
doaj   +1 more source

A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation

open access: yesFuture Internet
The evolution towards an Open Radio Access Network (O-RAN) and 6G introduces unprecedented openness and intelligence in mobile networks, alongside significant security challenges.
Evangelos Chaskos   +2 more
doaj   +1 more source

Risks to Zero Trust in a Federated Mission Partner Environment

open access: yes, 2022
Recent cybersecurity events have prompted the federal government to begin investigating strategies to transition to Zero Trust Architectures (ZTA) for federal information systems.
Mittal, Sudip, Strandell, Keith
core  

Home - About - Disclaimer - Privacy