Results 61 to 70 of about 773 (179)

Designing a Zero Trust Architecture for Securing API Gateways in Digital Banking Systems

open access: yesJournal of Information Systems and Informatics
In the era of digital banking transformation, Application Programming Interfaces (APIs) are essential for system integration and customer-facing innovations but also increase exposure to cyber security risks such as credential theft, API abuse, data ...
Riama Santy Sitorus, B. Junedi Hutagaol
doaj   +1 more source

A comprehensive access control model integrating zero trust architecture [PDF]

open access: yes
In contemporary IT landscapes, trust in entities, whether internal or external, within organizations has become obsolete. Establishing and enforcing strict access controls, alongside continuous verification, is imperative to safeguard organizational ...
Jyosthna, Pattabhi Mary   +1 more
core   +2 more sources

A three-tier microsegmentation framework for enterprise networks under Zero Trust Architecture

open access: yesAlexandria Engineering Journal
Traditional perimeter-based security models are increasingly inadequate for modern enterprise environments, often leading to “security silos” where inconsistent policies across infrastructure layers facilitate lateral movement by attackers.
Hari N.N.   +5 more
doaj   +1 more source

MEASURING TRUST IN NAVY INFORMATION SYSTEMS ARCHITECTURES TO AID IN NAVY'S ADOPTION OF ITS ZERO TRUST STRATEGY [PDF]

open access: yes
This thesis examines the cybersecurity impacts of a Zero Trust Architecture (ZTA) within a U.S. Navy data center, specifically focusing on information systems’ trust evaluations.
Thompson, Jesse L.
core   +1 more source

Method of dynamic trust assessment in Zero Trust Architecture based on explainable artificial intelligence

open access: yesÌнформаційні технології та компʼютерна інженерія
The transformation of contemporary corporate IT infrastructures has rendered conventional cybersecurity models ineffective, prompting a shift to the Zero Trust Architecture (ZTA); however, its practical implementation is complicated by a rigid reliance ...
A. Palamarchuk
doaj   +1 more source

Overview of Zero Trust Architecture Trend and Advancement in Information Security [PDF]

open access: yes
Zero Trust Architecture (ZTA) has become a trending and revolutionary architecture in information security, transitioning from the conventional concept of perimeter security to a ‘never trust, always verify’ model. This study examines the concepts of ZTA,
Alade, Olanrewaju E.   +2 more
core   +1 more source

Federated Zero Trust Architecture using Artificial Intelligence [PDF]

open access: yes
Cloud computing services have become ubiquitous, and currently, every organization uses some form of cloud computing service. Furthermore, even if an organization does not allow BYOD for work, employees will still bring their own devices to manage their ...
Foo, Ernest   +4 more
core   +2 more sources

PALANTIR: Zero-trust architecture for Managed Security Service Provider [PDF]

open access: yes, 2022
The H2020 PALANTIR project aims at delivering a Security-as-a-Service solution to SMEs and microenterprises via the exploitation of containerised Network Functions. However, these functions are conceived by third-party developers and can also be deployed
Antonio Lioy   +8 more
core  

Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks

open access: yesFuture Internet
The Open Radio Access Network (O-RAN) paradigm promises unprecedented flexibility and cost efficiency for 6G networks but introduces critical security risks due to its disaggregated, AI-driven architecture.
Mohammed El-Hajj
doaj   +1 more source

Evaluating the Application of Zero Trust Architecture (ZTA) Implementation in Nigeria's Banking Industry

open access: yesJournal of Electrical and Electronic Engineering
The growing number and sophistication of cyberattacks against financial institutions have underscored the need for a more robust cybersecurity framework in Nigeria’s banking industry. This research examines the implementation of Zero Trust Architecture (ZTA), a contemporary security model that focuses on identity authentication, the principle of least ...
Adewale Ashogbon, Oscar Okpere
openaire   +1 more source

Home - About - Disclaimer - Privacy