A survey on zero trust architecture: Challenges and future trends
Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …
of current technology. Zero trust is a new type of network security model, which is based on …
A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and
capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks …
capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks …
[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …
processing systems requires high security because more data must be saved in cloud …
A zero-trust architecture for remote access in industrial IoT infrastructures
This paper considers the domain of Industrial Internet of Things (IIoT) infrastructures and the
recurring need for collaboration across teams and stakeholders by means of remote access …
recurring need for collaboration across teams and stakeholders by means of remote access …
A maturity framework for zero‐trust security in multiaccess edge computing
Multiaccess Edge Computing (MEC) has been adopted to provide an environment that
supports cloud computing capabilities and IT services at the network edge. The open …
supports cloud computing capabilities and IT services at the network edge. The open …
A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0
The inherent vulnerabilities of Operational Technology (OT) systems to cyberattacks have
historically been mitigated through the practice of air-gap**, effectively isolating them from …
historically been mitigated through the practice of air-gap**, effectively isolating them from …
Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework
As financial institutions navigate an increasingly complex cyber threat landscape and
regulatory ecosystem, there is a pressing need for a robust and adaptive security …
regulatory ecosystem, there is a pressing need for a robust and adaptive security …
Zero-trust for the system design lifecycle
In an age of worsening global threat landscape and accelerating uncertainty, the design and
manufacture of systems must increase resilience and robustness across both the system …
manufacture of systems must increase resilience and robustness across both the system …
Investigation of nanogrids for improved navy installation energy resilience
Military bases perform important national security missions. In order to perform these
missions, specific electrical energy loads must have continuous, uninterrupted power even …
missions, specific electrical energy loads must have continuous, uninterrupted power even …
Insight into user acceptance and adoption of autonomous systems in mission critical environments
K Weger, L Matsuyama, R Zimmermann… - … Journal of Human …, 2023 - Taylor & Francis
With Industry 4.0 the immense progression of Artificial Intelligence (AI) technology has
introduced new challenges for engineers to effectively design human-automation interaction …
introduced new challenges for engineers to effectively design human-automation interaction …