检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang
机构地区:[1]School of Computer Science,School of Cyber Science and Engineering,Engineering Research Center of Digital Forensics,Ministry of Education,Nanjing University of Information Science and Technology,Nanjing,210044,China [2]Department of Computing Science,University of Aberdeen,Aberdeen,AB243FX,UK [3]Software Engineering Department,College of Computer and Information Sciences,King Saud University,Riyadh,12372,Saudi Arabia [4]Computer Science Department,Community College,King Saud University,Riyadh,11437,Saudi Arabia [5]Sanya Institute of Hunan University of Science and Technology,Sanya,572024,China
出 处:《Computers, Materials & Continua》2025年第2期1593-1613,共21页计算机、材料和连续体(英文)
基 金:supported by the National Natural Science Foundation of China(Grants Nos.62473146,62072249 and 62072056);the National Science Foundation of Hunan Province(Grant No.2024JJ3017);the Hunan Provincial Key Research and Development Program(Grant No.2022GK2019);by the Researchers Supporting Project Number(RSP2024R509),King Saud University,Riyadh,Saudi Arabia.
摘 要:In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
关 键 词:Zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15