Autonomous identity-based threat segmentation for zero trust architecture

Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access. However, conventional access controls are static and fail to consider evolving user activities and con...

Full description

Saved in:
Bibliographic Details
Main Author: Sina Ahmadi
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2025-12-01
Series:Cyber Security and Applications
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2772918425000232
Tags: Add Tag
No Tags, Be the first to tag this record!