1 |
What is a Zero Trust Architecture [Internet]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture.
|
2 |
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, 2020.
|
3 |
Evolving Zero Trust : How real-world deployments and attacks are shaping the future of Zero Trust strategies [Internet]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWJJdT.
|
4 |
What Zero Trust Architecture Is and How to Achieve It [Internet]. Available: https://www.illumio.com/cybersecurity101/zero-trust.
|
5 |
S. Y. Kim, K. H. Jeong, Y. N. Hwang, and D. H. Nyang, "Abnormal Behavior Detection for Zero Trust Security Model Using Deep Learning," Korea Information Processing Society Collection of academic papers, vol. 28, no. 1, pp. 132-135, 2021.
|
6 |
Zero Trust Introduction Acceleration-Microsoft's report [Internet]. Available: https://blog.naver.com/cspark14/222453433114.
|
7 |
R. Vanickis, P. Jacob, S. Dehghanzadeh, and B. Lee, Access Control Policy Enforcement for Zero-Trust-Networking, 2018 29th Irish Signals and Systems Conference (ISSC), pp. 1-6, 2018. doi: 10.1109/ISSC.2018.8585365.
DOI
|
8 |
J. Y Chun, Zero trust basis of network security strategy, IDG Summary AKAMAI MEGAZONE, 2021.
|
9 |
A. Kerman, O. Borchert, S. Rose, and A. Tan, Implementing a zero trust architecture, The MITRE Corporation, Tech. Rep, 2020.
|
10 |
M. J. Hwang, Microsoft Zero Trust Network Strategy and Implementation Plan, Microsoft Cyber Security Solutions Group, 2020.
|
11 |
What is Zero Trust? [Internet]. Available: https://www.vmware.com/kr/topics/glossary/content/zero-trust.html.
|