Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access. However, conventional access controls are static and fail to consider evolving user activities and con...
Saved in:
Main Author: | Sina Ahmadi |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
Series: | Cyber Security and Applications |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000232 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by: Mohammed El-Hajj
Published: (2025-05-01) -
THE ANALYSIS AND GENERALIZATION AVAILABLE APPROACHES OF CLASSIFICATION OF THREATS FOR PRIVATE DATA’S SAFETY
by: Alexander Petrovitch Rosenko, et al.
Published: (2022-05-01) -
Research on security protection of unmanned aerial vehicle systems based on zero trust
by: Ji Shengkai, et al.
Published: (2025-04-01) -
Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
by: Shruti Kulkarni, et al.
Published: (2025-07-01) -
5G defense network using commercial gNodeB with zero trust architecture
by: Woocheol Kim, et al.
Published: (2025-06-01)