Exploring zero trust network architectures for building secure networks (original) (raw)

Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks

Engr. Tahir Bashir

Journal of Computer Science and Technology Studies ISSN: 2709-104X, 2024

View PDFchevron_right

Zero Trust Architecture in IT Security: Implementing Zero Trust Models to Enhance Security and Reduce Vulnerabilities in Enterprise Networks

Ismail Sanni

Zero Trust Architecture in IT Security, 2023

View PDFchevron_right

Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges

Shiva Pokhrel

View PDFchevron_right

Zero Trust Networking -Effects on Cyber Risk & Challenges

SiVa SendhilVelan

Zero Trust Networking -Effects on Cyber Risk & Challenges, 2019

View PDFchevron_right

A Zero Trust Framework Security to Prevent Data Breaches and Mitigate the Cloud Network Attacks

IJRASET Publication

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

View PDFchevron_right

Zero-Trust Network Best Practices: Strengthening Security in a Dynamic Cyber Landscape

Sugath Jayavi Premalal

2023

View PDFchevron_right

Zero Trust Architecture: Trend and Impact on Information Security

onome edo

International Journal of Emerging Technology and Advanced Engineering, 2022

View PDFchevron_right

Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication

Casimer Decusatis

2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016

View PDFchevron_right

Advancing Zero Trust Network Authentication: Innovations in Privacy-Preserving Authentication Mechanisms

Tapomoy Adhikari

2024

View PDFchevron_right

Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security

Himanshu sharma

ESP Journal of Engineering & Technology Advancements , 2022

View PDFchevron_right

The Trust Problem in Modern Network Infrastructures

Adrian L Shaw

Communications in Computer and Information Science, 2015

View PDFchevron_right

The pervasive trust foundation for security in next generation networks

Lotfi Ben Othmane

2010

View PDFchevron_right

Security of Zero Trust Networks in Cloud Computing: A Comparative Review

Sirshak Sarkar

Sustainability, 2022

View PDFchevron_right

The Why and How of adopting Zero Trust Model in Organizations

Anita nair

2021

View PDFchevron_right

The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper)

Lotfi Ben Othmane

2012

View PDFchevron_right

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Casimer Decusatis

Advances in Science, Technology and Engineering Systems Journal, 2017

View PDFchevron_right

Zero Trust Validation: From Practical Approaches to Theory

Yuri Bobbert

Scientific Journal of Research & Reviews, 2020

View PDFchevron_right

Virtual enterprise networks: the next generation of secure enterprise networking

Germano Caronni

Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2000

View PDFchevron_right

Zero-Trust Security Models Overview

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT, Keshav Jena

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023

View PDFchevron_right

Trust Establishment in SDN: Controller and Applications

tebogo kgogo

International Journal of Computer Network and Information Security

View PDFchevron_right

ZTA: Never Trust, Always Verify

Charmaine Sample

European Conference on Cyber Warfare and Security

View PDFchevron_right

Zero Trust and Advanced Persistent Threats: Who Will Win the War?

Todd Whittaker

International Conference on Cyber Warfare and Security, 2022

View PDFchevron_right

Removing the Reliance on Perimeters for Security using Network Views

Iffat Anjum

Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies

View PDFchevron_right

Analysis of Multi-factor Authentication (MFA) Schemes in Zero Trust Architecture (ZTA): Current State, Challenges, and Future Trends

Yuanyuan Liu

International Journal of Computer Applications, 2024

View PDFchevron_right

SoK: Context and Risk Aware Access Control for Zero Trust Systems

Thomas Newe

Security and Communication Networks

View PDFchevron_right

Zero Trust Security Reference Architecture

Nya Murray

Zero Trust Security Reference Architecture, 2023

View PDFchevron_right

Zero Trust Cybersecurity: Procedures and Considerations in Context

Brady Lund

Encyclopedia, 2024

View PDFchevron_right

A Trust Management Framework for Network Applications within an SDN Environment

Ali E. Abdallah

2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2017

View PDFchevron_right

Towards a Trust Envisioned Cyber Security

Angela Francis

International Journal of Innovation and Applied Studies, 2013

View PDFchevron_right

SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation

Parikshit Juluri

2012

View PDFchevron_right

Zero Trust: The Magic Bullet or Devil’s Advocate?

Helvi Salminen

European Conference on Cyber Warfare and Security

View PDFchevron_right

An Integrated Security Architecture for Next Generation Networks

samiur rahman

2015

View PDFchevron_right

A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing

Simsam Hijjawi

Security and Communication Networks

View PDFchevron_right

VIRTUAL PRIVATE NETWORK A VERITABLE TOOL FOR NETWORK SECURITY

Editor IJRET

View PDFchevron_right