Results 21 to 30 of about 773 (179)

Cloud-Native Security using Zero Trust Architecture [PDF]

open access: yes, 2023
Cloud-native applications are transforming enterprise IT landscapes by leveraging containerization, microservices, and orchestration platforms such as Kubernetes.
Gurpreet Singh
core   +1 more source

Linking Contexts from Distinct Data Sources in Zero Trust Federation

open access: yes, 2022
An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses information of users and devices, called context, for authentication and authorization.
Hirai, Masato   +2 more
core   +1 more source

Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm

open access: yesIET Blockchain, Volume 3, Issue 2, Page 98-115, June 2023., 2023
This paper proposes a security framework to enhance the security of the banking sector by using a composite design integrating the zero‐trust concept with blockchain technology. The paper outlines three algorithms that ensure the confidentiality of the transactions and builds trust among the sender, sender's bank, and recipient's bank.
Umair B. Chaudhry, Aysha K. M. Hydros
wiley   +1 more source

Design and Implementation of the Zero Trust Model in the Power Internet of Things

open access: yesInternational Transactions on Electrical Energy Systems, Volume 2023, Issue 1, 2023., 2023
As a novel network security scheme, the zero trust model can effectively improve the traditional role‐based access control model in the public network by continuous trust evaluation and dynamic authorization. As a private network for collecting the health status data of the power equipment, the terminals in the power Internet of Things (IoT) have the ...
Kehe Wu   +4 more
wiley   +1 more source

PUFDCA: A Zero‐Trust‐Based IoT Device Continuous Authentication Protocol

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end‐to‐end approach from the edge devices to cloud or hybrid service. The exponential growth besides the simple and low‐cost nature of IoT devices has made IoT system an attractive target for several types of security attacks such as impersonation, spoofing, and ...
Shrooq Alshomrani   +2 more
wiley   +1 more source

Zero trust framework for protecting federal networks and cloud services

open access: yesInternational Journal of Applied Mathematics, Sciences, and Technology for National Defense
There has been a rapid uptake of cloud technologies in public sectors due to increased efficiency across operations while increasing the complexity of cyber threats.
Sudheer Kotilingala
doaj   +1 more source

Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture

open access: yesIEEE Access, 2023
Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly ...
Taisho Sasada   +4 more
doaj   +1 more source

Mitigating Zero Trust Implementation Challenges in Enterprise Network Security: A 2020 Perspective [PDF]

open access: yes, 2021
With the rise of remote work and cloud-first strategies in 2020, the traditional perimeter-based security model became increasingly obsolete. Zero Trust Architecture (ZTA), which emphasizes “never trust, always verify,” emerged as a ...
Jaswanth, Chadalavada
core  

Injectable Stimuli‐Responsive Amphiphilic Hydrogel for Rapid Hemostasis, Robust Tissue Adhesion, and Controlled Drug Delivery in Trauma and Surgical Care

open access: yesAdvanced Healthcare Materials, Volume 15, Issue 16, 24 April 2026.
Fast‐acting hydrogel seals bleeding wounds as the illustrated injectable, pH‐responsive network rapidly gels in situ to stop hemorrhage, adhere strongly to wet tissue, and release antibiotics in a controlled, pH‐dependent manner. The material withstands high pressures, shows excellent biocompatibility, and degrades safely, offering a versatile platform
Arvind K. Singh Chandel   +5 more
wiley   +1 more source

Toward a Performance-Based Trustworthy Edge-Cloud Continuum

open access: yesIEEE Access
The Edge-Cloud Continuum refers to the dynamic provisioning of distributed computing and network resources that can be scaled to support the creation of secure, resource-efficient, and decentralised digital ecosystems, which also support federated ...
Indika Dhanapala   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy