Results 21 to 30 of about 773 (179)
Cloud-Native Security using Zero Trust Architecture [PDF]
Cloud-native applications are transforming enterprise IT landscapes by leveraging containerization, microservices, and orchestration platforms such as Kubernetes.
Gurpreet Singh
core +1 more source
Linking Contexts from Distinct Data Sources in Zero Trust Federation
An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses information of users and devices, called context, for authentication and authorization.
Hirai, Masato +2 more
core +1 more source
This paper proposes a security framework to enhance the security of the banking sector by using a composite design integrating the zero‐trust concept with blockchain technology. The paper outlines three algorithms that ensure the confidentiality of the transactions and builds trust among the sender, sender's bank, and recipient's bank.
Umair B. Chaudhry, Aysha K. M. Hydros
wiley +1 more source
Design and Implementation of the Zero Trust Model in the Power Internet of Things
As a novel network security scheme, the zero trust model can effectively improve the traditional role‐based access control model in the public network by continuous trust evaluation and dynamic authorization. As a private network for collecting the health status data of the power equipment, the terminals in the power Internet of Things (IoT) have the ...
Kehe Wu +4 more
wiley +1 more source
PUFDCA: A Zero‐Trust‐Based IoT Device Continuous Authentication Protocol
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end‐to‐end approach from the edge devices to cloud or hybrid service. The exponential growth besides the simple and low‐cost nature of IoT devices has made IoT system an attractive target for several types of security attacks such as impersonation, spoofing, and ...
Shrooq Alshomrani +2 more
wiley +1 more source
Zero trust framework for protecting federal networks and cloud services
There has been a rapid uptake of cloud technologies in public sectors due to increased efficiency across operations while increasing the complexity of cyber threats.
Sudheer Kotilingala
doaj +1 more source
Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly ...
Taisho Sasada +4 more
doaj +1 more source
Mitigating Zero Trust Implementation Challenges in Enterprise Network Security: A 2020 Perspective [PDF]
With the rise of remote work and cloud-first strategies in 2020, the traditional perimeter-based security model became increasingly obsolete. Zero Trust Architecture (ZTA), which emphasizes “never trust, always verify,” emerged as a ...
Jaswanth, Chadalavada
core
Fast‐acting hydrogel seals bleeding wounds as the illustrated injectable, pH‐responsive network rapidly gels in situ to stop hemorrhage, adhere strongly to wet tissue, and release antibiotics in a controlled, pH‐dependent manner. The material withstands high pressures, shows excellent biocompatibility, and degrades safely, offering a versatile platform
Arvind K. Singh Chandel +5 more
wiley +1 more source
Toward a Performance-Based Trustworthy Edge-Cloud Continuum
The Edge-Cloud Continuum refers to the dynamic provisioning of distributed computing and network resources that can be scaled to support the creation of secure, resource-efficient, and decentralised digital ecosystems, which also support federated ...
Indika Dhanapala +3 more
doaj +1 more source

