A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
To counter the decreased efficiency of the perimeter-based network model and due to the ease of cyber-attacks, zero trust security was introduced. Zero trust security is a security framework that does not trust any user, whether internal or external, and verifies each time a transaction is requested...
Saved in:
| Main Authors: | Varun Varma Sangaraju, SV Achuta Rao, Amjan Shaik, Prasuna VG, Nagaraju P B S.R.K.R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Kragujevac
2025-03-01
|
| Series: | Proceedings on Engineering Sciences |
| Subjects: | |
| Online Access: | https://pesjournal.net/journal/v7-n1/47.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
by: Taisho Sasada, et al.
Published: (2024-01-01) -
Toward zero trust in 5G Industrial Internet collaboration systems
by: Han Zhang, et al.
Published: (2025-04-01) -
Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks
by: Qiao Liu, et al.
Published: (2024-10-01) -
Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
by: Shruti Kulkarni, et al.
Published: (2025-07-01) -
Towards the computer systems design based on Zero Trust Architecture
by: A. I. Brazhuk, et al.
Published: (2024-12-01)