Results 81 to 90 of about 773 (179)
Zero Trust Architecture: A Comprehensive Approach to Incident Response Management [PDF]
Zero Trust Architecture is a modern security strategy that is based on the principle of “never trust, always verify”. This approach to security eliminates trust from an organization’s network architecture and focuses on managing enterprise risk ...
Rimbawa, H.A Danang +2 more
core +2 more sources
Zero-trust based dynamic access control for cloud computing
Most corporations and organizations rely heavily on access control to protect data accessibility and enable resource sharing across networks and departments.
Ri Wang, Chen Li, Kun Zhang, Bibo Tu
doaj +1 more source
Zero-trust architecture (ZTA) requires continuous and adaptive identity authentication to maintain security in dynamic environments. However, current federated learning (FL)-based authentication models often struggle to incorporate evolving attack ...
Jie Ji, Shi Qiu, Shengpeng Ye, Xin Liu
doaj +1 more source
The Role of Zero Trust Architecture in Modern Cybersecurity: Integration with IAM and Emerging Technologies [PDF]
As cyber threats continue to evolve, organizations are increasingly adopting advanced security frameworks such as Zero Trust Architecture (ZTA) to protect their digital assets.
Filho, Wilson Leite Rebouças
core +1 more source
A Hybrid Framework for Securing 5G-Enabled Healthcare Systems [PDF]
The rapid adoption of 5G technology in healthcare introduces significant challenges regarding data privacy and security. This paper proposes a hybrid framework integrating blockchain, zero-trust architecture (ZTA), and AI-driven threat detection to ...
Mabina, Alton, Mbotho, Amber
core +2 more sources
Continuous Smartphone Authentication via Multimodal Biometrics and Optimized Ensemble Learning
The ubiquity of smartphones has transformed them into primary repositories of sensitive data; however, traditional one-time authentication mechanisms create a critical trust gap by failing to verify identity post-unlock.
Chia-Sheng Cheng +3 more
doaj +1 more source
Modelling and Analysing Zero-Trust-Architectures Regarding Performance and Security [PDF]
Integrating a Zero Trust Architecture (ZTA) into a system is a step towards establishing a good defence against external and internal threats. However, there are different approaches to integrating a ZTA which vary in the used components ...
Cholakov, Evgeni
core +2 more sources
ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the integration of communication and internet in its network.
Faris Alsulami +3 more
doaj +1 more source
In the dynamic and ever-changing domain of Unmanned Aerial Vehicles (UAVs), the utmost importance lies in guaranteeing resilient and lucid security measures.
Ahmed, Imtiaz +4 more
core
The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorities,
Sridhar Varadala, Hao Xu
doaj +1 more source

