Articles with "zero trust" as a keyword



Photo from archive.org

Zero-Trust Principles for Legacy Components

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-09055-1

Abstract: In this paper we briefly outline as set of rules for integration of legacy devices into a modern industrial control system. These rules are fairly simple, and are mostly derived from “Zero Trust” principles. These… read more here.

Keywords: legacy components; zero trust; trust principles; principles legacy ... See more keywords
Photo from wikipedia

The zero trust supply chain: Managing supply chain risk in the absence of trust

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Production Research"

DOI: 10.1080/00207543.2021.1884311

Abstract: The modern supply chain is characterised by an ill-defined and porous perimeter, allowing entry points for potential adversaries to intercept sensitive information and disrupt operations. Such supply chain attacks are increasing in frequency and their… read more here.

Keywords: trust; zero trust; supply chain; trust supply ... See more keywords
Photo by krakenimages from unsplash

A Comprehensive Framework for Migrating to Zero Trust Architecture

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3248622

Abstract: Migrating to Zero Trust Architecture (ZTA) is a strategic approach to strengthen the enterprise’s security postures. The shift to ZTA requires changes across the enterprise which can be challenging to achieve. Utilizing an effective framework… read more here.

Keywords: zta; zero trust; framework; framework migrating ... See more keywords
Photo by krakenimages from unsplash

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3157996

Abstract: Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any devices and systems may be compromised and hence untrusted. In addition, data collected by and sent from IoT devices may be shared with and… read more here.

Keywords: information; information sharing; zero trust; internet things ... See more keywords
Photo by scottwebb from unsplash

SysFlow: Toward a Programmable Zero Trust Framework for System Security

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3264152

Abstract: Zero Trust, as an emerging trend of cybersecurity paradigms in modern infrastructure (e.g., enterprise, cloud, edge, IoT, and 5G), is moving security defenses from static and perimeter-based control systems to focus on users and resources… read more here.

Keywords: system; security; zero trust; system security ... See more keywords
Photo by thinkmagically from unsplash

Design and Implementation of the Zero Trust Model in the Power Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "International Transactions on Electrical Energy Systems"

DOI: 10.1155/2023/6545323

Abstract: As a novel network security scheme, the zero trust model can effectively improve the traditional role-based access control model in the public network by continuous trust evaluation and dynamic authorization. As a private network for… read more here.

Keywords: trust model; power; trust; security ... See more keywords
Photo from wikipedia

Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology

Sign Up to like & get
recommendations!
Published in 2020 at "BMC Medical Informatics and Decision Making"

DOI: 10.1186/s12911-020-01275-y

Abstract: Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data… read more here.

Keywords: trust principles; system; zero trust; security ... See more keywords