2019
DOI: 10.6028/nist.sp.800-207-draft
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Zero Trust Architecture

Abstract: This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercis… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 2 publications
0
19
0
Order By: Relevance
“…In addition to the built-in features of private Ethereum blockchain such as immutability, reliability, and security [2,36,66], this lending model confirms the trustworthiness by implementing privacy group patterns for each group of loan participants on Besu Ethereum client [4,11]. The model of our malicious detection algorithm is partially connected to zero trust architecture, where it reduces the uncertainty in access management [60]. The MaliciousDetector smart contract is acting as a policy decision point to monitor and track API requests to allow users to enter into a trustworthy zone [60,62].…”
Section: Trustworthiness Between Users Involved In a Loan Agreementmentioning
confidence: 91%
See 1 more Smart Citation
“…In addition to the built-in features of private Ethereum blockchain such as immutability, reliability, and security [2,36,66], this lending model confirms the trustworthiness by implementing privacy group patterns for each group of loan participants on Besu Ethereum client [4,11]. The model of our malicious detection algorithm is partially connected to zero trust architecture, where it reduces the uncertainty in access management [60]. The MaliciousDetector smart contract is acting as a policy decision point to monitor and track API requests to allow users to enter into a trustworthy zone [60,62].…”
Section: Trustworthiness Between Users Involved In a Loan Agreementmentioning
confidence: 91%
“…The model of our malicious detection algorithm is partially connected to zero trust architecture, where it reduces the uncertainty in access management [60]. The MaliciousDetector smart contract is acting as a policy decision point to monitor and track API requests to allow users to enter into a trustworthy zone [60,62].…”
Section: Trustworthiness Between Users Involved In a Loan Agreementmentioning
confidence: 99%
“…trust domains [47]- [49]. At the same time, considering the flexibility of the MEC architecture, achieving mutual authentication with anonymity and untraceability are crucial for data security and user privacy [50], [51]. Authentication methods include single-domain authentication [41], crossdomain authentication [52], and the SDN-based handover authentication scheme [53].…”
Section: ) Identity and Authenticationmentioning
confidence: 99%
“…However, edge networks might exfiltrate sensitive information and rich network context information, such as client status information, traffic statistics and local network conditions that are used by applications to offer context-aware optimization [12]. • Privilege escalation: Privilege escalation arises when a bad actor exploits a design flaw, bug, or configuration error in an operating system or application to gain elevated access to protected resources that would typically be restricted to that user [51], [104]. The malicious user can then use the newly acquired unauthorised privileges to steal confidential data, run administrative commands or deploy malware, and potentially do severe damage to server applications [5], [13], [77].…”
Section: Edge Network Threatsmentioning
confidence: 99%
See 1 more Smart Citation