2023
DOI: 10.3390/e25121595
|View full text |Cite
|
Sign up to set email alerts
|

Theory and Application of Zero Trust Security: A Brief Survey

Hongzhaoning Kang,
Gang Liu,
Quan Wang
et al.

Abstract: As cross-border access becomes more frequent, traditional perimeter-based network security models can no longer cope with evolving security requirements. Zero trust is a novel paradigm for cybersecurity based on the core concept of “never trust, always verify”. It attempts to protect against security risks related to internal threats by eliminating the demarcations between the internal and external network of traditional network perimeters. Nevertheless, research on the theory and application of zero trust is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 42 publications
0
0
0
Order By: Relevance
“…We use T i to represent the sum of the communication time between node i and other nodes on the chain, as shown in Eq. (3).…”
Section: Overall Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…We use T i to represent the sum of the communication time between node i and other nodes on the chain, as shown in Eq. (3).…”
Section: Overall Frameworkmentioning
confidence: 99%
“…However, the rise of novel cyber threats such as insider threat attacks [1] and forged identity attacks [2] has rendered traditional network security models inadequate in ensuring current network security. Consequently, the concept of a zero trust network [3] was introduced.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation