Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication

JJD Rivera, A Muhammad… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As network systems advance and become more sophisticated, the associated security
challenges grow more complex. The zero trust model emerges as a new paradigm to …

Zt &t: secure service session management using blockchain-based tokens in zero trust networks.

JJ Diaz Rivera, W Akbar, TA Khan… - Annals of …, 2024 - Springer
In today's interconnected world, the line that separates the network perimeter can no longer
be identified. This has led to the development of Zero Trust Networking (ZTN) and Software …

Challenges and Future Scope

G HL, V Ravi, KS Roy - Securing the Future: Introduction to Zero Trust in …, 2024 - Springer
In the same Fortinet survey, firms mentioned additional difficulties they encountered when
implementing zero trust. The majority, 59%, found it difficult to continuously authenticate …

Beyond Collectibles: A Comprehensive Review of Non-Fungible Token Applications

A Semnani, G Yang - Available at SSRN 5046792, 2024 - papers.ssrn.com
In this review study, we aim to present a comprehensive, up-to-date overview of NFT
applications. We organized the various applications into six major categories, with each …

[HTML][HTML] Role and Impact of On-Behalf-of Tokens for Enhancing Cloud Identity Management: A review

WI Do - apeksha-jain.com
In today's cloud computing landscape managing identities is crucial for ensuring effective
access to resources. This study dives into the use of “On Behalf of Tokens,” which allow one …