Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Strategy for implementing of zero trust architecture

M Tsai, S Lee, SW Shieh - IEEE Transactions on Reliability, 2024 - ieeexplore.ieee.org
In recent years, due to the impact of the COVID-19 pandemic, enterprises have been forced
to adapt their operation patterns to ensure resilience, transitioning from traditional office …

Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies

N Kashmar, M Adda, H Ibrahim, JF Morin, T Ducheman - Electronics, 2023 - mdpi.com
Access to resources can take many forms: digital access via an onsite network, through an
external site, website, etc., or physical access to labs, machines, information repositories …

Health access broker: Secure, patient-controlled management of personal health records in the cloud

Z Abaid, A Shaghaghi, R Gunawardena… - … Intelligence in Security …, 2021 - Springer
Secure and privacy-preserving management of Personal Health Records (PHRs) has
proved to be a major challenge in modern healthcare. Current solutions generally do not …

[PDF][PDF] Instantiation and Implementation of HEAD Metamodel in an Industrial Environment: Non-IoT and IoT Case Studies. Electronics 2023, 12, 3216

N Kashmar, M Adda, H Ibrahim, JF Morin, T Ducheman - 2023 - academia.edu
Access to resources can take many forms: digital access via an onsite network, through an
external site, website, etc., or physical access to labs, machines, information repositories …

Securing Amazon Web Services with Zero Trust Architecture

S Jaiswal - 2024 - aaltodoc.aalto.fi
Securing cloud infrastructure has become a crucial priority for organizations worldwide in
the rapidly evolving technological landscape. As businesses increasingly depend on cloud …

[PDF][PDF] Securing Software-Defined Network Enabled Enterprises Against Insider Threats

A Shaghaghi - 2018 - scholar.archive.org
Insider threats are among the most challenging cyber security issues for enterprises, and
even the world's most protected organi zations have not been immune to them. In the first …