A Zero Trust Framework Security to Prevent Data Breaches and Mitigate the Cloud Network Attacks (original) (raw)

Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security

Himanshu sharma

ESP Journal of Engineering & Technology Advancements , 2022

View PDFchevron_right

Exploring zero trust network architectures for building secure networks

M. Scott Koger, Brett J . L . Landry

Proceedings of the Southwest Decision Sciences, 2023

View PDFchevron_right

Zero Trust Networking -Effects on Cyber Risk & Challenges

SiVa SendhilVelan

Zero Trust Networking -Effects on Cyber Risk & Challenges, 2019

View PDFchevron_right

Zero Trust Architecture in IT Security: Implementing Zero Trust Models to Enhance Security and Reduce Vulnerabilities in Enterprise Networks

Ismail Sanni

Zero Trust Architecture in IT Security, 2023

View PDFchevron_right

A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Simsam Hijjawi

Security and Communication Networks

View PDFchevron_right

Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges

Shiva Pokhrel

View PDFchevron_right

JETA Zero Trust in the Cloud Implementing Zero Trust Architecture for Enhanced Cloud Security

Himanshu sharma

ESP Journal of Engineering & Technology Advancements , 2022

View PDFchevron_right

Zero Trust Architecture: Trend and Impact on Information Security

onome edo

International Journal of Emerging Technology and Advanced Engineering, 2022

View PDFchevron_right

Zero-Trust Network Best Practices: Strengthening Security in a Dynamic Cyber Landscape

Sugath Jayavi Premalal

2023

View PDFchevron_right

Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks

Engr. Tahir Bashir

Journal of Computer Science and Technology Studies ISSN: 2709-104X, 2024

View PDFchevron_right

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Thomas Newe

Security and Communication Networks

View PDFchevron_right

Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication

Casimer Decusatis

2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016

View PDFchevron_right

The pervasive trust foundation for security in next generation networks

Lotfi Ben Othmane

2010

View PDFchevron_right

A Zero-Trust Federated Identity and Access Management Framework for Cloud and Cloud-based Computing Environments

Krassie Petrova

Association for Information Systems (AIS), 2020

View PDFchevron_right

Zero-Trust Security Models Overview

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT, Keshav Jena

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023

View PDFchevron_right

Advancing Zero Trust Network Authentication: Innovations in Privacy-Preserving Authentication Mechanisms

Tapomoy Adhikari

2024

View PDFchevron_right

The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper)

Lotfi Ben Othmane

2012

View PDFchevron_right

Zero Trust Cybersecurity: Procedures and Considerations in Context

Brady Lund

Encyclopedia, 2024

View PDFchevron_right

Towards a Trust Envisioned Cyber Security

Angela Francis

International Journal of Innovation and Applied Studies, 2013

View PDFchevron_right

The Why and How of adopting Zero Trust Model in Organizations

Anita nair

2021

View PDFchevron_right

A novel trust management model for edge computing

Shahzaib Tahir

Complex & Intelligent Systems

View PDFchevron_right

Security, Trust and Privacy–A New Direction for Pervasive Computing

Jamalul-lail Ab Manan

wseas.us

View PDFchevron_right

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

Sirshak Sarkar

Sustainability, 2022

View PDFchevron_right

Zero Trust Security Reference Architecture

Nya Murray

Zero Trust Security Reference Architecture, 2023

View PDFchevron_right

A Public Infrastructure for a Trusted Wireless World

Sikha Bagui

Future Internet

View PDFchevron_right

Securing IoT Devices Using Zero Trust and Blockchain

Dr. Suparna Dhar

Journal of Organizational Computing and Electronic Commerce, 2020

View PDFchevron_right

Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

Bouchra Marzak

International Journal of Interactive Multimedia and Artificial Intelligence, 2017

View PDFchevron_right

Zero Trust Validation: From Practical Approaches to Theory

Yuri Bobbert

Scientific Journal of Research & Reviews, 2020

View PDFchevron_right

Analysis of Multi-factor Authentication (MFA) Schemes in Zero Trust Architecture (ZTA): Current State, Challenges, and Future Trends

Yuanyuan Liu

International Journal of Computer Applications, 2024

View PDFchevron_right

Security and trust in the 6G era

Satish Kanugovi

IEEE Access

View PDFchevron_right

Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions

Tyrone Grandison

International Journal of Network Management, 2020

View PDFchevron_right

The Cloud: Understanding the Security, Privacy and Trust Challenges

Sadie Creese

SSRN Electronic Journal, 2000

View PDFchevron_right

Security analysis of authentication protocols for next-generation mobile and CE cloud services

Peter Corcoran

2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin), 2011

View PDFchevron_right

A security architecture based on trust management for pervasive computing systems

Tim Finin

2005

View PDFchevron_right

Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures

Lamiel Toch

Lecture Notes in Computer Science, 2013

View PDFchevron_right