Zero Trust Networks: Evolution and Application from Concept to Practice  

在线阅读下载全文

作  者:Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 

机构地区:[1]School of Computer Science,School of Cyber Science and Engineering,Engineering Research Center of Digital Forensics,Ministry of Education,Nanjing University of Information Science and Technology,Nanjing,210044,China [2]Department of Computing Science,University of Aberdeen,Aberdeen,AB243FX,UK [3]Software Engineering Department,College of Computer and Information Sciences,King Saud University,Riyadh,12372,Saudi Arabia [4]Computer Science Department,Community College,King Saud University,Riyadh,11437,Saudi Arabia [5]Sanya Institute of Hunan University of Science and Technology,Sanya,572024,China

出  处:《Computers, Materials & Continua》2025年第2期1593-1613,共21页计算机、材料和连续体(英文)

基  金:supported by the National Natural Science Foundation of China(Grants Nos.62473146,62072249 and 62072056);the National Science Foundation of Hunan Province(Grant No.2024JJ3017);the Hunan Provincial Key Research and Development Program(Grant No.2022GK2019);by the Researchers Supporting Project Number(RSP2024R509),King Saud University,Riyadh,Saudi Arabia.

摘  要:In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.

关 键 词:Zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象