[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions
PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …
puts users in control of their data and online identities. However, Web3 faces significant …
[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
[HTML][HTML] Security of zero trust networks in cloud computing: A comparative review
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
Edge intelligence—research opportunities for distributed computing continuum systems
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …
to our future society a plethora of new and useful applications, which will certainly …
A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services,
including in critical infrastructure sectors, it is important to review security mechanisms, risks …
including in critical infrastructure sectors, it is important to review security mechanisms, risks …
Machine learning in identity and access management systems: Survey and deep dive
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
[HTML][HTML] Theory and application of zero trust security: A brief survey
H Kang, G Liu, Q Wang, L Meng, J Liu - Entropy, 2023 - mdpi.com
As cross-border access becomes more frequent, traditional perimeter-based network
security models can no longer cope with evolving security requirements. Zero trust is a novel …
security models can no longer cope with evolving security requirements. Zero trust is a novel …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
A critical analysis of Zero Trust Architecture (ZTA)
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …
industry and government as a new way to produce systems with a high degree of security …
Multivocal literature review on zero-trust security implementation
C Itodo, M Ozer - Computers & Security, 2024 - Elsevier
The sudden shift from physical office location to a fully remote or hybrid work model
accelerated by the COVID-19 pandemic, is a phenomenon that changed how organizations …
accelerated by the COVID-19 pandemic, is a phenomenon that changed how organizations …