Application of Zero Trust Security Architecture in Power Communication Network Security Management System
Abstract
References
Recommendations
Zero trust security model: Defining new boundaries to organizational network
IC3-2023: Proceedings of the 2023 Fifteenth International Conference on Contemporary ComputingThe zero-trust security model is a modern alternative to traditional perimeter network security and has been gaining popularity over the last several years. Traditional perimeter security suffers the problem of single-point failure and is compelling ...
Dynamic Access Control and Authorization System based on Zero-trust architecture
CCRIS '20: Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent SystemWith the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on border protection cannot meet the ...
Secure Mechanism of Intelligent Urban Railway Cloud Platform Based on Zero-trust Security Architecture
HP3C '22: Proceedings of the 6th International Conference on High Performance Compilation, Computing and CommunicationsAiming to strengthen the stability of operation and maintenance of the urban rail transit network cloud platform at this stage, it is emerging to solve the security mechanism of the intelligent urban railway cloud platform. In this paper, we proposed a ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/6c9b932a-e97a-4408-8712-f5804146594c/3654446.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 30Total Downloads
- Downloads (Last 12 months)30
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format