[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

Web-Biometrics for User Authenticity Verification in Zero Trust Access Control

T Sasada, Y Taenaka, Y Kadobayashi, D Fall - IEEE Access, 2024 - ieeexplore.ieee.org
In the case of remote work, once a user completes account authentication, they can continue
to access confidential data without further verification of user identity. Thus, if a user's device …

Factor Analysis of Learning Motivation Difference on Cybersecurity Training with Zero Trust Architecture

T Sasada, M Kawai, Y Masuda, Y Taenaka… - IEEE …, 2023 - ieeexplore.ieee.org
Cloud computing technologies have increased the diversity and complexity of security
expertise needed to prevent cyber attacks. decisionIn software and system architect area …

The Research and Application of Zero Trust: A Review

Q Meng, J Fei, B Lu, X Wang, W Wu, Z Zhang… - Available at SSRN … - papers.ssrn.com
With the emergence of new technologies such as cloud computing, mobile internet, the
Internet of Things, and 5G, the internet ecosystem has undergone significant changes. The …