期刊文献+
共找到403篇文章
< 1 2 21 >
每页显示 20 50 100
Zero Trust Networks: Evolution and Application from Concept to Practice
1
作者 Yongjun Ren Zhiming Wang +3 位作者 Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 2025年第2期1593-1613,共21页
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ... In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions. 展开更多
关键词 zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
在线阅读 下载PDF
Toward zero trust in 5G Industrial Internet collaboration systems
2
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 zero trust 5G Industrial Internet collaboration system trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Research on the Synergistic Application of Secure Isolation Gateways and Zero Trust Architecture in the Oil and Gas IoT
3
作者 Wang Bo Wang Wei +1 位作者 Zhang Fan Li Zhaoyun 《China Oil & Gas》 2025年第3期61-66,共6页
As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial c... As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements. 展开更多
关键词 industrial control system internet things oil gas IoT control systems secure isolation gateways zero trust architecture information security challengesthe gas extraction plant
在线阅读 下载PDF
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
4
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
Privacy-preserving authentication scheme based on zero trust architecture 被引量:2
5
作者 Fei Tang Chunliang Ma Kefei Cheng 《Digital Communications and Networks》 CSCD 2024年第5期1211-1220,共10页
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog... Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technology in the zero trust network.In this paper,a Traceable Universal Designated Verifier Signature(TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture.Specifically,when a client requests access to server resources,we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party.In addition,the security of the proposed scheme is proved and its efficiency is analyzed.Finally,TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme. 展开更多
关键词 zero trust architecture PRIVACY-PRESERVING Authentication Anonymity revocation
在线阅读 下载PDF
Trust Assessment Model Based on a Zero Trust Strategy in a Community Cloud Environment 被引量:2
6
作者 Rodrigue N’goran Jean-Louis Tetchueng +2 位作者 Ghislain Pandry Yvon Kermarrec Olivier Asseu 《Engineering(科研)》 CAS 2022年第11期479-496,共18页
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate... The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing. 展开更多
关键词 trust Management Resources Sharing Community Cloud zero trust
在线阅读 下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security 被引量:1
7
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY Quantum Computers Post Quantum Cryptography Q-Day zero trust
在线阅读 下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
8
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
在线阅读 下载PDF
Dissecting zero trust:research landscape and its implementation in IoT
9
作者 Chunwen Liu Ru Tan +5 位作者 Yang Wu Yun Feng Ze Jin Fangjiao Zhang Yuling Liu Qixu Liu 《Cybersecurity》 2025年第2期201-228,共28页
As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to e... As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis.We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes.Nevertheless,the challenges associated with implementing zero trust security are acknowledged.We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges.Ultimately,this study aims to serve as a strategic analysis of the zero trust model,intending to empower scholars in the field to pursue deeper and more focused research in the future. 展开更多
关键词 zero trust Research landscape Bibliometrics method Internet of things Hot topics
原文传递
Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges 被引量:1
10
作者 Yang Cao Shiva Raj Pokhrel +2 位作者 Ye Zhu Robin Doss Gang Li 《Machine Intelligence Research》 EI CSCD 2024年第2期294-317,共24页
Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security fie... Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security field.It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system.However,ZTA automation and orchestration,towards seamless deployment on real-world networks,has been limited to be reviewed in the existing literature.In this paper,we first identify the bottlenecks,discuss the background of ZTA and compare it with traditional perimeter-based security architectures.More importantly,we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA.Overall,in this review paper,we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA. 展开更多
关键词 zero trust architecture cyber security artificial intelligence access control AUTHENTICATION
原文传递
财政档案信息化建设中的数据安全与隐私保护研究
11
作者 曾武 《计算机应用文摘》 2026年第1期250-252,255,共4页
财政档案信息量大、类型复杂,且包含大量涉密数据与敏感信息,因此在推进信息化、网络化、智能化的过程中,数据安全与隐私保护面临新的挑战。文章从财政档案信息化现状出发,分析当前系统在数据存储、访问控制、传输安全、权限管理及第三... 财政档案信息量大、类型复杂,且包含大量涉密数据与敏感信息,因此在推进信息化、网络化、智能化的过程中,数据安全与隐私保护面临新的挑战。文章从财政档案信息化现状出发,分析当前系统在数据存储、访问控制、传输安全、权限管理及第三方共享等方面存在的风险,提出一套面向财政档案的数据安全体系、隐私保护机制与技术实现路径,包括分级保护体系构建、AI智能脱敏、零信任访问控制、安全审计、区块链存证及容灾备份等策略。研究表明,通过技术与制度双轮驱动,可有效提升财政档案信息化建设的安全能力,保障财政数据的完整性、保密性与可用性。 展开更多
关键词 财政档案 信息化建设 数据安全 隐私保护 零信任 智能脱敏
在线阅读 下载PDF
SRv6与零信任融合的网络安全架构研究 被引量:1
12
作者 王强 杨宏 杨南 《通信技术》 2025年第6期651-660,共10页
随着网络技术的不断发展,网络安全面临着越来越多的挑战。传统的网络安全防护机制已经难以满足当前复杂多变的网络环境需求。基于IPv6的段路由(Segment Routing IPv6,SRv6)作为一种新型的网络协议,具有灵活的路径控制和可编程性等优势,... 随着网络技术的不断发展,网络安全面临着越来越多的挑战。传统的网络安全防护机制已经难以满足当前复杂多变的网络环境需求。基于IPv6的段路由(Segment Routing IPv6,SRv6)作为一种新型的网络协议,具有灵活的路径控制和可编程性等优势,为网络提供了更高效的路由和流量控制能力。零信任作为一种全新的安全理念,强调永不信任、持续验证和最小权限原则,颠覆了传统基于边界的安全模式。将两者结合,可构建更强大、灵活且适应动态环境的网络安全防护体系。通过分析其技术途径、设计方案、应用场景和面临的挑战,为未来网络安全的发展提供有益的参考。 展开更多
关键词 SRv6 零信任 网络安全架构 策略动态协同
在线阅读 下载PDF
基于多层防御的医院科研数据平台安全设计与实践 被引量:1
13
作者 王坤 彭建明 《中国数字医学》 2025年第7期14-18,共5页
本文基于零信任安全模型,针对医院科研数据平台的安全需求,提出并设计了一套多层防御架构。该架构通过堡垒机实现安全接入控制,结合安全沙箱技术保障数据隔离访问,并依托分布式防火墙与动态权限管理机制,确保域用户在远程登录过程中的... 本文基于零信任安全模型,针对医院科研数据平台的安全需求,提出并设计了一套多层防御架构。该架构通过堡垒机实现安全接入控制,结合安全沙箱技术保障数据隔离访问,并依托分布式防火墙与动态权限管理机制,确保域用户在远程登录过程中的数据安全。同时,采用域控集中化管理策略和上网行为审计措施,有效降低了敏感数据泄露风险。研究表明,该方案显著提升了医院科研数据平台的安全防护能力和合规管理水平,为医疗行业数字化建设提供了可落地的安全实践参考。 展开更多
关键词 零信任模型 医院科研数据 数据安全 堡垒机 安全沙箱 动态权限管理
暂未订购
基于UTXO模型区块链的众包物流可信身份认证模型 被引量:3
14
作者 李致远 吴越 +1 位作者 张威威 李沅格 《江苏大学学报(自然科学版)》 CAS 北大核心 2025年第1期57-63,共7页
针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私... 针对现有集中式众包物流平台中用户身份数据存储与管理存在的隐私泄露和篡改问题,提出一种基于UTXO模型区块链的众包物流可信身份认证模型.该模型包括利用区块链技术实现身份注册、身份验证、身份撤销及身份认证.针对链上存储用户隐私数据风险的问题,采用混合加解密方案对链上个人信息做安全存储与分享;针对平台认证用户身份的问题,采用可信身份凭证以零知识证明方式登录众包物流平台.对身份信息以及认证进行安全性分析,并将该方法与LIU方法、LI方法的安全性能进行了对比.在Python3.9环境下完成试验,进行了身份信息加密和零知识身份认证测试分析.结果表明该方案的认证时延和处理事务能力均优于现有的SHAO方案. 展开更多
关键词 众包物流 区块链 身份管理 UTXO模型 可信身份认证 零知识证明
在线阅读 下载PDF
零信任机制在机载传感器系统网络安全中的应用
15
作者 杨斌 姜家财 吴昊 《电讯技术》 北大核心 2025年第12期2113-2123,共11页
随着机载传感器系统开放式、网络化、智能化发展,其面临的网络安全威胁日益严峻。传统的边界防御策略难以应对复杂多变的网络攻击威胁,零信任机制为机载传感器系统网络安全防护提供了全新的思路。为了将零信任机制引入到机载传感器系统... 随着机载传感器系统开放式、网络化、智能化发展,其面临的网络安全威胁日益严峻。传统的边界防御策略难以应对复杂多变的网络攻击威胁,零信任机制为机载传感器系统网络安全防护提供了全新的思路。为了将零信任机制引入到机载传感器系统,介绍了零信任安全架构的核心思想,分析了其在机载传感器系统网络安全中的应用优势。阐述了机载传感器系统网络安全现状及面临的挑战,提出了基于零信任机制的机载传感器系统网络安全防护架构,对其架构和主要技术实现途径进行阐述,并结合机载传感器系统特点对技术发展需求进行了分析和展望。 展开更多
关键词 机载传感器系统 网络安全 零信任 可信认证 安全监测与响应
在线阅读 下载PDF
基于零信任的勒索攻击防御探讨
16
作者 李建国 武淑敏 《青岛远洋船员职业学院学报》 2025年第2期42-46,共5页
随着信息技术的不断发展,网络安全问题日益凸显,勒索攻击成为当今网络安全领域的一大挑战。传统的网络安全防御方式已经无法满足日益复杂的勒索攻击威胁。本文通过对零信任安全模型的介绍和分析,探讨了基于零信任的勒索攻击防御方法,包... 随着信息技术的不断发展,网络安全问题日益凸显,勒索攻击成为当今网络安全领域的一大挑战。传统的网络安全防御方式已经无法满足日益复杂的勒索攻击威胁。本文通过对零信任安全模型的介绍和分析,探讨了基于零信任的勒索攻击防御方法,包括身份验证、访问控制、威胁检测与响应等方面的应用。通过零信任模型,可以有效提高网络安全防御能力,降低勒索攻击对组织和个人的威胁。 展开更多
关键词 零信任 勒索攻击 网络安全 身份验证 访问控制
在线阅读 下载PDF
Port-Based Pre-Authentication Message Transmission Scheme
17
作者 Sunghyun Yu Yoojae Won 《Computer Modeling in Engineering & Sciences》 2025年第6期3943-3980,共38页
Pre-Authentication and Post-Connection(PAPC)plays a crucial role in realizing the Zero Trust security model by ensuring that access to network resources is granted only after successful authentication.While earlier ap... Pre-Authentication and Post-Connection(PAPC)plays a crucial role in realizing the Zero Trust security model by ensuring that access to network resources is granted only after successful authentication.While earlier approaches such as Port Knocking(PK)and Single Packet Authorization(SPA)introduced pre-authentication concepts,they suffer from limitations including plaintext communication,protocol dependency,reliance on dedicated clients,and inefficiency under modern network conditions.These constraints hinder their applicability in emerging distributed and resource-constrained environments such as AIoT and browser-based systems.To address these challenges,this study proposes a novel port-sequence-based PAPC scheme structured as a modular model comprising a client,server,and ephemeral Key Management System(KMS).The system employs the Advanced Encryption Standard(AES-128)to protect message confidentiality and uses a Hash-Based Message Authentication Code(HMAC-SHA256)to ensure integrity.Authentication messages are securely fragmented and mapped to destination port numbers using a signature-based avoidance algorithm,which prevents collisions with unsafe or reserved port ranges.The server observes incoming port sequences,retrieves the necessary keys from the KMS,reconstructs and verifies the encrypted data,and conditionally updates firewall policies.Unlike SPA,which requires decrypting all incoming payloads and imposes server-side overhead,the proposed system verifies only port-derived fragments,significantly reducing computational burden.Furthermore,it eliminates the need for raw socket access or custom clients,supporting browser-based operation and enabling protocol-independent deployment.Through a functional web-based prototype and emulated testing,the system achieved an F1-score exceeding 95%in detecting unauthorized access while maintaining low resource overhead.Although port sequence generation introduces some client-side cost,it remains lightweight and scalable.By tightly integrating lightweight cryptographic algorithms with a transport-layer communication model,this work presents a conceptually validated architecture that contributes a novel direction for interoperable and scalable Zero Trust enforcement in future network ecosystems. 展开更多
关键词 Port knocking single packet authorization pre-authentication zero trust network security HMAC AUTHENTICATION AIoT security
在线阅读 下载PDF
基于零信任的网络安全模型架构及其应用
18
作者 王长杰 《清远职业技术学院学报》 2025年第4期68-75,共8页
由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为... 由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为中心的安全保护模式,使访问行为更加安全可信。本文在对传统网络架构及安全隐患介绍的基础上,阐述零信任网络安全架构技术和核心思想,设计出包括控制层面、数据层面、访问主体、访问客体四部分的零信任网络安全应用模型总体架构,并提出在远程移动办公和云计算应用场景中的可行性解决方案,确保网络中各类资源能够可信可控地被访问。 展开更多
关键词 零信任 身份认证 动态访问控制 网络安全模型
在线阅读 下载PDF
基于零信任架构的高职院校校园网安全访问控制方法
19
作者 张超 《电脑与信息技术》 2025年第4期56-59,101,共5页
校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管... 校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管理,减少直接暴露在公网的业务系统数量,并通过构建用户身份认证机制,实现对用户身份的严格验证和动态管理。然后,根据用户的身份、职务和访问需求,评估校园网访问权限并做出动态调整,结合细粒度的权限管控策略,确保用户只能访问其权限范围内的资源。最后,执行校园网多层次安全访问控制,保证网络运行安全。实验结果表明,应用该方法后,校园网访问安全评估值介于0.90和0.98之间,说明该方法使校园网的安全性得到了显著提升。 展开更多
关键词 零信任架构 校园网 安全访问控制 用户身份
在线阅读 下载PDF
电力系统安全一体化战略发展研究
20
作者 赵中原 《电工电气》 2025年第4期1-7,19,共8页
网络安全和物理安全是电力系统可靠性和弹性的重要方面。针对海量电网信息数据和间歇性分布式能源带来的电力系统网络物理挑战,特别是智能信息化对输电系统稳定性以及大数据应用和分布能源控制,阐述了网络信息输电规划、云技术、分布能... 网络安全和物理安全是电力系统可靠性和弹性的重要方面。针对海量电网信息数据和间歇性分布式能源带来的电力系统网络物理挑战,特别是智能信息化对输电系统稳定性以及大数据应用和分布能源控制,阐述了网络信息输电规划、云技术、分布能源聚合和零信任范式等技术措施手段,并积极开发和改进与安全合规相关的包括安规指南、操作指导、最佳实践等内容的产品,以确保电力系统的可靠和安全运行。 展开更多
关键词 电力系统安全 网络物理系统 一体化 网络安全 物理安全 分布式能源 零信任安全
在线阅读 下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部