2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
DOI: 10.1109/trustcom50675.2020.00247
|View full text |Cite
|
Sign up to set email alerts
|

Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…Sateesh et al [23] proposed an SDP architecture for vehicular selforganizing networks to enable the spontaneous creation of networks between vehicles. Several researchers implemented proofs of concept to demonstrate the applicability of zero trust to the IoT [24][25][26][27]. Chen et al [28] proposed a zero trust security protection scheme for the power IoT based on blockchain, which realized strict management of control information, more standardized management of access rights to data, and much higher trustworthiness and interaction rates of business data.…”
Section: Zero Trust Securitymentioning
confidence: 99%
“…Sateesh et al [23] proposed an SDP architecture for vehicular selforganizing networks to enable the spontaneous creation of networks between vehicles. Several researchers implemented proofs of concept to demonstrate the applicability of zero trust to the IoT [24][25][26][27]. Chen et al [28] proposed a zero trust security protection scheme for the power IoT based on blockchain, which realized strict management of control information, more standardized management of access rights to data, and much higher trustworthiness and interaction rates of business data.…”
Section: Zero Trust Securitymentioning
confidence: 99%
“…Risk scoring refers to assigning scores regarding whether the user's device has an adequate level of security. Each time a user requests access to a resource, the user is subjected to risk scoring [5,11,12]. In a company that implements zero trust, the scoring criteria for risk scoring are established by the trust algorithm's policies, and access is only allowed if the user device's risk score meets a certain standard.…”
Section: Trust Algorithm In Zero Trustmentioning
confidence: 99%
“…We see further ZT processes such as determining the trustworthiness of each partner as out of scope of this paper as it focuses on an SFC network architecture. This extra functionality must be provided by the ZT components in the network and is discussed in related work [6], [31], [35]. We also consider the management of SFs to be out of scope.…”
Section: A Assumptionsmentioning
confidence: 99%