Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks
- José Manuel Bernabé Murcia,
- Eduardo Cánovas,
- Jesús García-Rodríguez,
- Alejandro M. Zarca,
- Antonio Skarmeta
Future Generation Computer Systems (FGCS), Volume 162, Issue Chttps://doi.org/10.1016/j.future.2024.08.003AbstractThe adoption of the Computing Continuum is characterised by the seamless integration of diverse computing environments and devices. In this dynamic landscape, sharing resources across the continuum is becoming a reality and security must move an ...
Highlights- Zero-trust approach for managing auth in decentralized continuum computing platforms.
- SSI, DIDs, and VCs with Zero-Knowledge proofs for flexibility and privacy.
- Integration into a holistic multi-domain orchestration and resource ...
- review-articleOctober 2024
Towards zero trust security in connected vehicles: A comprehensive survey
AbstractZero Trust is the new cybersecurity model that challenges the traditional one by promoting continuous verification of users, devices, and applications, whatever their position or origin. This model is critical for reducing the attack surface and ...
- research-articleAugust 2024
BDPM: A secure batch dynamic password management scheme in industrial internet environments
Future Generation Computer Systems (FGCS), Volume 157, Issue CPages 193–209https://doi.org/10.1016/j.future.2024.03.030Highlights- Construct a batch dynamic password management system architecture.
- Design a batch password generation algorithm using SM3 cryptographic hash algorithm.
- Introduce an abnormal password update mechanism with zero trust.
- Propose a ...
The rapid development of Industrial Internet has promoted the deep integration of Information Technology (IT) and Industrial Control (IC), so that network attacks have gradually invaded IC zone. Password security is the first line of defense to ...
- research-articleAugust 2024
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
AbstractThe widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, biosensors, and more, ...
- research-articleJune 2024
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
The Journal of Supercomputing (JSCO), Volume 80, Issue 14Pages 20682–20714https://doi.org/10.1007/s11227-024-06262-yAbstractThe distributed authentication of a large number of resource-constrained power terminal devices (PTDs) is crucial for ensuring the security of the power IoT communication. However, existing solutions are inadequate in terms of security (such as ...
-
- research-articleMay 2024
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
International Journal of Information Security (IJOIS), Volume 23, Issue 4Pages 2793–2808https://doi.org/10.1007/s10207-024-00863-7AbstractSoftware-defined perimeters (SDP) revolutionize network security by offering dynamic and adaptive access controls, focusing on user and device authentication to substantially reduce the attack surface. Despite their potential, traditional SDP ...
- research-articleApril 2024
A critical analysis of Zero Trust Architecture (ZTA)
Highlights- Zero trust (ZT) has become a very hot approach for building secure systems, promoted by industry and government as a new way to produce systems with a high degree of security.
- We have used security patterns to design and evaluate ...
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by industry and government as a new way to produce systems with a high degree of security. ZT is based on not trusting any request for accessing resources. ...
- research-articleApril 2024
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures
AbstractThe growing digitalization of industrial systems and the increasing adoption of cloud technologies pose significant challenges to the secure management of modern industrial infrastructures integrating different Industrial Internet of Things (IIoT)...
- research-articleMarch 2024
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
Journal of Network and Systems Management (JNSM), Volume 32, Issue 2https://doi.org/10.1007/s10922-024-09807-xAbstractThe upcoming sixth generation (6 G) networks present significant security challenges due to the growing demand for virtualization, as indicated by their key performance indicators (KPIs). To ensure communication secrecy in such a distributed ...
- research-articleMarch 2024
Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in Multi-access Edge Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 241, Issue Chttps://doi.org/10.1016/j.comnet.2024.110197AbstractThis paper proposes an efficient trust-aware authentication and task offloading scheme for Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The proposed method uses a dual fuzzy logic system to evaluate the ...
Highlights- A new ZTO component is introduced at the MEC host level. It validates the UE identity before tasks are allocated and processed. The ZTO component is aligned with the zero trust architecture requirements for a multi-layer cybersecurity ...
- research-articleJanuary 2024
An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 2Article No.: 32, Pages 1–20https://doi.org/10.1145/3583073Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and ...
- research-articleJanuary 2024
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach
AbstractIn the rapidly evolving field of information technology, network security, especially enterprise endpoint security, has emerged as a major challenge. This paper presents a comprehensive and interactive method for network access and user ...
Highlights- Implement a zero-trust model to balance convenience and security.
- Minimize control prior to terminal device network access, identify and block potential threats in real-time.
- Simplify password interaction design for enhanced ...
- research-articleNovember 2023
ZTWeb: Cross site scripting detection based on zero trust
AbstractPolicy defense technology is the mainstream XSS defense technology. However, defense mechanisms with fixed policies may hardly cover the attack surface persistently in dynamic environments. Moreover, the undifferentiated policy makes the ...
- research-articleNovember 2023
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning
- José María Jorquera Valero,
- Pedro Miguel Sánchez Sánchez,
- Manuel Gil Pérez,
- Alberto Huertas Celdrán,
- Gregorio Martínez Pérez
Computer Communications (COMS), Volume 211, Issue CPages 229–238https://doi.org/10.1016/j.comcom.2023.09.010AbstractTrust, security, and privacy are three of the major pillars to assemble the fifth-generation network and beyond. Despite such pillars are principally interconnected, a multitude of challenges arise that need to be addressed separately. 5G ...
- research-articleOctober 2023
Zero trust cybersecurity: Critical success factors and A maturity assessment framework
AbstractZero trust cybersecurity is beginning to replace traditional perimeter-based security strategies and is being adopted by organizations across a wide range of industries. However, the implementation of zero trust is a complex ...
- research-articleAugust 2023
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network
ACM Transactions on Internet Technology (TOIT), Volume 23, Issue 3Article No.: 41, Pages 1–23https://doi.org/10.1145/3511901Edge networks are providing services for an increasing number of companies, and they can be used for communication between edge devices and edge gateways. However, the performance of edge devices varies greatly, and it is not easy to upgrade low-...
- research-articleJune 2023
ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
AbstractWith the rapid development of information technologies in the power industry, a large number of power devices are connected to the Internet, and thus expand the exposure. Attackers could control some devices with weak security ...
- research-articleApril 2023
A zero trust and blockchain-based defense model for smart electric vehicle chargers
Journal of Network and Computer Applications (JNCA), Volume 213, Issue Chttps://doi.org/10.1016/j.jnca.2023.103599AbstractElectric vehicles (EVs) have rapidly developed over the last decade due to their environmental benefits. As a key component of EVs, electric vehicle chargers are becoming increasingly digital and intelligent. However, due to the vast ...
Graphical abstractDisplay Omitted
Highlights- We propose an EV charger protection schemebased on zero trust, blockchain, and SM algorithms.
- research-articleFebruary 2023
Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment
Journal of Information Security and Applications (JISA), Volume 72, Issue Chttps://doi.org/10.1016/j.jisa.2022.103389AbstractTrust is an essential security component and plays a crucial role in building secure information processing systems. Many organizations have adopted zero-trust principles in their security mechanisms, especially in Cloud Computing ...
- ArticleJanuary 2023
Linking Contexts from Distinct Data Sources in Zero Trust Federation
Emerging Technologies for Authorization and AuthenticationPages 136–144https://doi.org/10.1007/978-3-031-25467-3_9AbstractAn access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses information of users and devices, called context, to verify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending ...