Results 151 to 160 of about 773 (179)

ZERO-TRUST ARCHITECTURE (ZTA) IN RURAL BANKING SYSTEMS USING AI-DRIVEN ANOMALY DETECTION

open access: yesInternational Research Journal of Modernization in Engineering Technology & Science
openaire   +1 more source

Protecting digital assets using an ontology based cyber situational awareness system. [PDF]

open access: yesFront Artif Intell
Almoabady TA   +7 more
europepmc   +1 more source

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

Computers and Security, 2021
Abstract Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity threats posed against conventional static authentication mechanisms that merely authenticate at ingress points of a platform. However, widely researched CA mechanisms that rely on user’s behavioural characteristics cannot be extended to ...
Syed Wajid Ali Shah   +2 more
exaly   +2 more sources

ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model

ACM Transactions on Privacy and Security
Recently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastructure (physical and virtual) and operational policies in place for IoT as a product of a ZT ...
Safwa Ameer   +2 more
exaly   +2 more sources

Home - About - Disclaimer - Privacy