Works matching Zero trust security model
Results: 26
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 2, p. 785, doi. 10.3390/app15020785
- By:
- Publication type:
- Article
引入内生安全的零信任模型.
- Published in:
- Journal of Zhengzhou University (Natural Science Edition), 2022, v. 54, n. 6, p. 51, doi. 10.13705/j.issn.1671-6841.2022085
- By:
- Publication type:
- Article
基于零信任的电力监控系统厂站端安全防护模型.
- Published in:
- Electric Power Information & Communication Technology / Dianli Xinxi yu Tongxin Jishu, 2024, v. 22, n. 3, p. 23, doi. 10.16543/j.2095-641x.electric.power.ict.2024.03.04
- By:
- Publication type:
- Article
CYBER SECURITY - AWARENESS & ZERO TRUST MODEL IN PUBLIC DOMAIN.
- Published in:
- Journal of Information Systems & Operations Management, 2021, v. 15, n. 2, p. 3
- By:
- Publication type:
- Article
A data plane security model of SR-BE/TE based on zero-trust architecture.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-24342-y
- By:
- Publication type:
- Article
Deployment of Zero Trust Access Security Model for Protection Against Cyber Crimes.
- Published in:
- IUP Journal of Computer Sciences, 2023, v. 17, n. 4, p. 52
- By:
- Publication type:
- Article
一种基于DNS的零信任增强认证系统设计.
- Published in:
- Cyber Security & Data Governance, 2024, v. 43, n. 7, p. 21, doi. 10.19358/j.issn.2097-1788.2024.07.004
- By:
- Publication type:
- Article
Adapting Zero Trust: Information Security Cultural Factors Considerations in the UAE Context.
- Published in:
- Asia-Pacific Journal of Information Technology & Multimedia, 2024, v. 13, n. 2, p. 287, doi. 10.17576/apjitm-2024-1302-09
- By:
- Publication type:
- Article
Dynamic access control method for SDP-based network environments.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13638-023-02305-9
- By:
- Publication type:
- Article
The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm.
- Published in:
- Journal of Information & Organizational Sciences, 2024, v. 48, n. 1, p. 149, doi. 10.31341/jios.48.1.8
- By:
- Publication type:
- Article
Cybersecurity and Information Assurance for the Clinical Laboratory.
- Published in:
- Journal of Applied Laboratory Medicine, 2023, v. 8, n. 1, p. 145, doi. 10.1093/jalm/jfac119
- By:
- Publication type:
- Article
Zero-Trust Model for Smart Manufacturing Industry.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 1, p. 221, doi. 10.3390/app13010221
- By:
- Publication type:
- Article
LBFT: An Asynchronous Committee-Based Blockchain Storage Strategy on Zero Trust Model.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 22, p. 11790, doi. 10.3390/app122211790
- By:
- Publication type:
- Article
Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 16, p. 7499, doi. 10.3390/app11167499
- By:
- Publication type:
- Article
基于零信任机制的联邦学习模型.
- Published in:
- Science Technology & Engineering, 2024, v. 24, n. 19, p. 8166, doi. 10.12404/j.issn.1671-1815.2303534
- By:
- Publication type:
- Article
Ensuring Continuous Verification of Application Security.
- Published in:
- Government Technology, 2022, v. 35, n. 8, p. 31
- By:
- Publication type:
- Article
Dissecting zero trust: research landscape and its implementation in IoT.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00212-0
- By:
- Publication type:
- Article
제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2022, v. 26, n. 2, p. 265, doi. 10.6109/jkiice.2022.26.2.265
- By:
- Publication type:
- Article
제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2021, v. 25, n. 10, p. 1391, doi. 10.6109/jkiice.2021.25.10.1391
- By:
- Publication type:
- Article
АНАЛІЗ СПОСОБІВ ОБХОДУ ІНСТРУМЕНТІВ ДЛЯ ЗАПОБІГАННЯМ ЗАГРОЗ ТА ДОСЛІДЖЕННЯ МЕТОДІВ ПРОТИДІЇ ЦЬОМУ.
- Published in:
- Science-Based Technologies, 2024, v. 62, n. 2, p. 116, doi. 10.18372/2310-5461.62.18705
- By:
- Publication type:
- Article
Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Journey of Privacy and Protection: A Privileged Access Management Perspective.
- Published in:
- ISSA Journal, 2024, v. 22, n. 6, p. 28
- By:
- Publication type:
- Article
Medical Devices in a Zero Trust Architecture.
- Published in:
- ISSA Journal, 2023, v. 21, n. 4, p. 9
- By:
- Publication type:
- Article
Design and Implementation of the Zero Trust Model in the Power Internet of Things.
- Published in:
- International Transactions on Electrical Energy Systems, 2023, v. 2023, p. 1, doi. 10.1155/2023/6545323
- By:
- Publication type:
- Article
Blockchain enabled zero trust based authentication scheme for railway communication networks.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00411-z
- By:
- Publication type:
- Article
DEVELOPMENT OF A METHOD FOR PROTECTING INFORMATION RESOURCES IN A CORPORATE NETWORK BY SEGMENTING TRAFFIC.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2024, v. 131, n. 9, p. 63, doi. 10.15587/1729-4061.2024.313158
- By:
- Publication type:
- Article