Exploring zero trust network architectures for building secure networks (original) (raw)
Related papers
Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks
Journal of Computer Science and Technology Studies ISSN: 2709-104X, 2024
Zero Trust Architecture in IT Security, 2023
Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges
Zero Trust Networking -Effects on Cyber Risk & Challenges
Zero Trust Networking -Effects on Cyber Risk & Challenges, 2019
A Zero Trust Framework Security to Prevent Data Breaches and Mitigate the Cloud Network Attacks
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Zero-Trust Network Best Practices: Strengthening Security in a Dynamic Cyber Landscape
2023
Zero Trust Architecture: Trend and Impact on Information Security
International Journal of Emerging Technology and Advanced Engineering, 2022
Implementing Zero Trust Cloud Networks with Transport Access Control and First Packet Authentication
2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016
2024
Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security
ESP Journal of Engineering & Technology Advancements , 2022
The Trust Problem in Modern Network Infrastructures
Communications in Computer and Information Science, 2015
The pervasive trust foundation for security in next generation networks
2010
Security of Zero Trust Networks in Cloud Computing: A Comparative Review
Sustainability, 2022
The Why and How of adopting Zero Trust Model in Organizations
2021
The Pervasive Trust Foundation for Security in Next Generation Networks (A Position Paper)
2012
Advances in Science, Technology and Engineering Systems Journal, 2017
Zero Trust Validation: From Practical Approaches to Theory
Scientific Journal of Research & Reviews, 2020
Virtual enterprise networks: the next generation of secure enterprise networking
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2000
Zero-Trust Security Models Overview
International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT, Keshav Jena
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
Trust Establishment in SDN: Controller and Applications
International Journal of Computer Network and Information Security
ZTA: Never Trust, Always Verify
European Conference on Cyber Warfare and Security
Zero Trust and Advanced Persistent Threats: Who Will Win the War?
International Conference on Cyber Warfare and Security, 2022
Removing the Reliance on Perimeters for Security using Network Views
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
International Journal of Computer Applications, 2024
SoK: Context and Risk Aware Access Control for Zero Trust Systems
Security and Communication Networks
Zero Trust Security Reference Architecture
Zero Trust Security Reference Architecture, 2023
Zero Trust Cybersecurity: Procedures and Considerations in Context
Encyclopedia, 2024
A Trust Management Framework for Network Applications within an SDN Environment
2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2017
Towards a Trust Envisioned Cyber Security
International Journal of Innovation and Applied Studies, 2013
2012
Zero Trust: The Magic Bullet or Devil’s Advocate?
European Conference on Cyber Warfare and Security
An Integrated Security Architecture for Next Generation Networks
2015
A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
Security and Communication Networks
VIRTUAL PRIVATE NETWORK A VERITABLE TOOL FOR NETWORK SECURITY