Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access. However, conventional access controls are static and fail to consider evolving user activities and con...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
Series: | Cyber Security and Applications |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000232 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|