[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …

Authentication technology in internet of things and privacy security issues in typical application scenarios

J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …

Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication

JJD Rivera, A Muhammad… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As network systems advance and become more sophisticated, the associated security
challenges grow more complex. The zero trust model emerges as a new paradigm to …

Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications

M Venkatesan, P Mani - Optical and Quantum Electronics, 2024 - Springer
Access control systems have become integral to every organization's defensive arsenal to
protect sensitive information and ensure that businesses comply with data privacy …

Zero Trust Architecture Using Hyperledger Fabric

V Awale, S Gaikwad - 2023 14th International Conference on …, 2023 - ieeexplore.ieee.org
Traditional security measures focused on network perimeter protection are no longer
sufficient to defend against cyber threats in the quickly changing digital environment of …

Zt &t: secure service session management using blockchain-based tokens in zero trust networks.

JJ Diaz Rivera, W Akbar, TA Khan… - Annals of …, 2024 - Springer
In today's interconnected world, the line that separates the network perimeter can no longer
be identified. This has led to the development of Zero Trust Networking (ZTN) and Software …

Formal Security of Zero Trust Architectures

A Poirrier - 2024 - theses.hal.science
The security architecture of Information Technology (IT) systems has traditionally been
based on the perimeter security model, in which resources are grouped into perimeters …

[PDF][PDF] ZETInChat: Zero Trust Infrastructure with Dynamic Service Deployment via Chatbot in Mesh Networks

GNN Barbosa, DMF Mattos - chat.zetin.com.br
The increasing frequency and severity of cyberattacks demand robust security solutions,
especially for missioncritical environments. A key challenge is the dynamic configuration of …