[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …

[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[HTML][HTML] Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

Edge intelligence—research opportunities for distributed computing continuum systems

VC Pujol, PK Donta, A Morichetta… - IEEE Internet …, 2023 - ieeexplore.ieee.org
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …

A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas

P Scalise, M Boeding, M Hempel, H Sharif… - Future Internet, 2024 - mdpi.com
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

[HTML][HTML] Theory and application of zero trust security: A brief survey

H Kang, G Liu, Q Wang, L Meng, J Liu - Entropy, 2023 - mdpi.com
As cross-border access becomes more frequent, traditional perimeter-based network
security models can no longer cope with evolving security requirements. Zero trust is a novel …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

A critical analysis of Zero Trust Architecture (ZTA)

EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …

Multivocal literature review on zero-trust security implementation

C Itodo, M Ozer - Computers & Security, 2024 - Elsevier
The sudden shift from physical office location to a fully remote or hybrid work model
accelerated by the COVID-19 pandemic, is a phenomenon that changed how organizations …