1 |
M. Sudakshina, D. A. Khan, and S. Jain, "Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic," New Generation Computing, pp. 1-24, 2021.
|
2 |
A. Kerman, O. Borchert, S. Rose, and A. Tan, "Implementing A Zero Trust Architecture," The MITRE Corporation, Tech. Rep, 2020.
|
3 |
M. Al-Asli and T. A. Ghaleb, "Review of signature-based techniques in antivirus products," International Conference on Computer and Information Sciences (ICCIS). IEEE, 2019.
|
4 |
L. Abeni and C. Kiraly, "Investigating the network performance of a real-time Linux Kernel," Proc. 15th Real Time Linux Workshop (RTLWS 2013), 2013.
|
5 |
G. Anil, "A Zero-Trust Security Framework for Granular Insight on Blind Spot and Comprehensive Device Protection in the Enterprise of Internet of Things (E-IOT)," BMS Institute of Technology, 2021.
|
6 |
K. D. Uttecht, "Zero Trust (ZT) Concepts for Federal Government Architectures," Massachusetts inst of tech lexington United States, 2020.
|
7 |
C. Wright, C. Cowan, J. Morris, S Smalley, and G. Kroah-Hartman, "Linux security module framework," in Ottawa Linux Symposium, vol. 8032, pp. 6-16, Jun. 2002.
|
8 |
A. Rastogi and K. E. Nygard, "Software Engineering Principles and Security Vulnerabilities," in CATA, pp. 180-190, Mar. 2019.
|
9 |
H. B. Chang, "A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident," Convergence security journal, vol. 15 no. 7, pp. 39-45, 2015.
|
10 |
R. Riccardo and M. Repetto, "Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model," Future Generation Computer Systems, vol. 85, pp. 235-249, 2018.
DOI
|
11 |
X. Hao, W. Ren, R. Xiong, T. Zhu, and K. K. R. Choo, "Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things," Future Generation Computer Systems, 2021.
|
12 |
J. Kindervag, "Build security into your network's dna: The zero trust network architecture," Forrester Research Inc, pp. 1-26, 2010.
|