Results 91 to 100 of about 773 (179)
Theory and Application of Zero Trust Security: A Brief Survey. [PDF]
Kang H, Liu G, Wang Q, Meng L, Liu J.
europepmc +1 more source
The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations
This study examines the viability of Zero Trust (ZT) models, a burgeoning measure of cybersecurity, in different cultural contexts. The ZT security model is based on the principle of “never trust, always verify” and, unlike traditional ...
Bader Zyoud, Syaheerah Lebai Lutfi
doaj +1 more source
A Systematic Literature Review of Zero Trust Architecture for Military UAV Security Systems
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors.
Alanoud A. Alquwayzani +1 more
doaj +1 more source
Towards 5G Zero Trusted Air Interface Architecture
5G is destined to be supporting large deployment of Industrial IoT (IIoT) with the characteristics of ultra-high densification and low latency. 5G utilizes a more intelligent architecture, with Radio Access Networks (RANs) no longer constrained by base ...
Fung, Eddy +5 more
core
Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
The widespread use of the Internet and the rapid growth of edge devices have increased the cyber-attack surface for these devices in Information and Communication Technologies (ICT).
Shahid Mahmood +5 more
doaj +1 more source
Case Study: The Next Generation of Network Management - AI, Automation, and Security in a Connected World [PDF]
Modern data center networks face unprecedented challenges in ensuring robust security due to the evolving complexity of cyber threats and the increasing sophistication of attack vectors.
Vaishali Nagpure
core +2 more sources
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
The Industrial Internet motivates the research and development of Zero-Trust Architecture (ZTA). Role-Based Access Control (RBAC) as one of the key technologies for ZTA has become a hot topic. Role mining algorithms are crucial for RBAC and interpretable
Yaqi Yang +5 more
doaj +1 more source
Metaverse is a paradigm where people can interact in virtual environments using current technologies. The Metaverse is being advanced by artificial intelligence (AI) as it develops.
Jeevalatha Ethiraj, Vijayan Ellapan
doaj +1 more source
A Next-Generation Cyber-Range Framework for O-RAN and 6G Security Validation
The evolution towards an Open Radio Access Network (O-RAN) and 6G introduces unprecedented openness and intelligence in mobile networks, alongside significant security challenges.
Evangelos Chaskos +2 more
doaj +1 more source
Risks to Zero Trust in a Federated Mission Partner Environment
Recent cybersecurity events have prompted the federal government to begin investigating strategies to transition to Zero Trust Architectures (ZTA) for federal information systems.
Mittal, Sudip, Strandell, Keith
core

