2021 IEEE International Conference on Web Services (ICWS) 2021
DOI: 10.1109/icws53863.2021.00016
|View full text |Cite
|
Sign up to set email alerts
|

Services for Zero Trust Architectures - A Research Roadmap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…In this phase, those users will operate by the unprivileged simulation in audit mode for a well-defined period to ensure qualified traffic. Then, users and devices having qualified traffic for a defined period can be activated and assigned to the unprivileged network [5], [18]. The results from the migration of the pilot program need to be validated to ensure that users can successfully be migrated to the Zero Trust environment or that the migration encounters any issues.…”
Section: • Phase 2: Validate Pilot Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In this phase, those users will operate by the unprivileged simulation in audit mode for a well-defined period to ensure qualified traffic. Then, users and devices having qualified traffic for a defined period can be activated and assigned to the unprivileged network [5], [18]. The results from the migration of the pilot program need to be validated to ensure that users can successfully be migrated to the Zero Trust environment or that the migration encounters any issues.…”
Section: • Phase 2: Validate Pilot Resultsmentioning
confidence: 99%
“…The results from the migration of the pilot program need to be validated to ensure that users can successfully be migrated to the Zero Trust environment or that the migration encounters any issues. If experiencing issues, the migration team should switch back to the old technologies and test the systems to ensure that the migration of the pilot program can continue as planned [18], [20].…”
Section: • Phase 2: Validate Pilot Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…AI technologies are considered as enablers for the Security Orchestration, Automation and Response (SOAR) solutions designed to automate and integrate different security tasks and processes in response to incidents [74]. SOAR is also one of the functions to be considered in the execution of ZTA [12],…”
Section: Introductionmentioning
confidence: 99%