ZERO-TRUST ARCHITECTURE (ZTA) IN RURAL BANKING SYSTEMS USING AI-DRIVEN ANOMALY DETECTION
openaire +1 more source
Protecting digital assets using an ontology based cyber situational awareness system. [PDF]
Almoabady TA +7 more
europepmc +1 more source
A Survey on Open Radio Access Networks: Challenges, Research Directions, and Open Source Approaches. [PDF]
Azariah W +5 more
europepmc +1 more source
Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control. [PDF]
Saleem J +3 more
europepmc +1 more source
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System. [PDF]
Huda S +4 more
europepmc +1 more source
A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures. [PDF]
Gentile AF +4 more
europepmc +1 more source
Related searches:
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
Computers and Security, 2021Abstract Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to ...
Syed Wajid Ali Shah +2 more
exaly +2 more sources
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model
ACM Transactions on Privacy and SecurityRecently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastructure (physical and virtual) and operational policies in place for IoT as a product of a ZT ...
Safwa Ameer +2 more
exaly +2 more sources

