Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access. However, conventional access controls are static and fail to consider evolving user activities and con...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000232 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|