Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access. However, conventional access controls are static and fail to consider evolving user activities and con...
Saved in:
| Main Author: | Sina Ahmadi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000232 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
by: Vedran Dakić, et al.
Published: (2024-12-01) -
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
by: Mohammed El-Hajj
Published: (2025-05-01) -
A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
by: Varun Varma Sangaraju, et al.
Published: (2025-03-01) -
Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks
by: Qiao Liu, et al.
Published: (2024-10-01) -
Towards the computer systems design based on Zero Trust Architecture
by: A. I. Brazhuk, et al.
Published: (2024-12-01)