[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

A json web signature based adaptive authentication modality for healthcare applications

V Krishnan, CS Sreeja, S Binu… - … Conference on Public …, 2022 - ieeexplore.ieee.org
In the era of fast internet-centric systems, the importance of security cannot be stressed
more. However, stringent and multiple layers of security measures tend to be a hindrance to …

Trusted Access Mechanism of Field Device in Industrial Edge Computing Environment

T Yu, M Wei, F Xiao, H Yang - 2024 International Conference …, 2024 - ieeexplore.ieee.org
With the increasing access of field devices into industrial networks, establishing a trusted
access mechanism has become a critical precondition for the deployment of industrial …

[PDF][PDF] A Review on Zero Trust—Balancing Security and Usability Needs

S Roy, AC Phadke - 2023 - academia.edu
Organizations have traditionally relied on perimeter security strategies to safeguard
resources against cyber-attacks. Digital transformation to the cloud has raised concern for …