期刊文献+
共找到423篇文章
< 1 2 22 >
每页显示 20 50 100
Zero Trust Networks: Evolution and Application from Concept to Practice
1
作者 Yongjun Ren Zhiming Wang +3 位作者 Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang 《Computers, Materials & Continua》 2025年第2期1593-1613,共21页
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not ... In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized technology.Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments.This paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key technologies.Additionally,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use cases.The paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions. 展开更多
关键词 zero trust CYBERSECURITY software-defined perimeter micro-segmentation internet of things
在线阅读 下载PDF
Toward zero trust in 5G Industrial Internet collaboration systems
2
作者 Han Zhang Ziyan Zhang Liquan Chen 《Digital Communications and Networks》 2025年第2期547-555,共9页
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To... With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system. 展开更多
关键词 zero trust 5G Industrial Internet collaboration system trust assessment Access control AUTHENTICATION
在线阅读 下载PDF
Research on the Synergistic Application of Secure Isolation Gateways and Zero Trust Architecture in the Oil and Gas IoT
3
作者 Wang Bo Wang Wei +1 位作者 Zhang Fan Li Zhaoyun 《China Oil & Gas》 2025年第3期61-66,共6页
As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial c... As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements. 展开更多
关键词 industrial control system internet things oil gas IoT control systems secure isolation gateways zero trust architecture information security challengesthe gas extraction plant
在线阅读 下载PDF
DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks
4
作者 Wenlong Ke Zilong Li +5 位作者 Peiyu Chen Benfeng Chen Jinglin Lv Qiang Wang Ziyi Jia Shigen Shen 《Computers, Materials & Continua》 2025年第8期3305-3319,共15页
Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Define... Zero Trust Network(ZTN)enhances network security through strict authentication and access control.However,in the ZTN,optimizing flow control to improve the quality of service is still facing challenges.Software Defined Network(SDN)provides solutions through centralized control and dynamic resource allocation,but the existing scheduling methods based on Deep Reinforcement Learning(DRL)are insufficient in terms of convergence speed and dynamic optimization capability.To solve these problems,this paper proposes DRL-AMIR,which is an efficient flow scheduling method for software defined ZTN.This method constructs a flow scheduling optimization model that comprehensively considers service delay,bandwidth occupation,and path hops.Additionally,it balances the differentiated requirements of delay-critical K-flows,bandwidth-intensive D-flows,and background B-flows through adaptiveweighting.Theproposed framework employs a customized state space comprising node labels,link bandwidth,delaymetrics,and path length.It incorporates an action space derived fromnode weights and a hybrid reward function that integrates both single-step and multi-step excitation mechanisms.Based on these components,a hierarchical architecture is designed,effectively integrating the data plane,control plane,and knowledge plane.In particular,the adaptive expert mechanism is introduced,which triggers the shortest path algorithm in the training process to accelerate convergence,reduce trial and error costs,and maintain stability.Experiments across diverse real-world network topologies demonstrate that DRL-AMIR achieves a 15–20%reduction in K-flow transmission delays,a 10–15%improvement in link bandwidth utilization compared to SPR,QoSR,and DRSIR,and a 30%faster convergence speed via adaptive expert mechanisms. 展开更多
关键词 zero trust network software-defined networking deep reinforcement learning flow scheduling
在线阅读 下载PDF
Privacy-preserving authentication scheme based on zero trust architecture 被引量:3
5
作者 Fei Tang Chunliang Ma Kefei Cheng 《Digital Communications and Networks》 CSCD 2024年第5期1211-1220,共10页
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog... Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technology in the zero trust network.In this paper,a Traceable Universal Designated Verifier Signature(TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture.Specifically,when a client requests access to server resources,we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party.In addition,the security of the proposed scheme is proved and its efficiency is analyzed.Finally,TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme. 展开更多
关键词 zero trust architecture PRIVACY-PRESERVING Authentication Anonymity revocation
在线阅读 下载PDF
Trust Assessment Model Based on a Zero Trust Strategy in a Community Cloud Environment 被引量:2
6
作者 Rodrigue N’goran Jean-Louis Tetchueng +2 位作者 Ghislain Pandry Yvon Kermarrec Olivier Asseu 《Engineering(科研)》 CAS 2022年第11期479-496,共18页
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate... The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing. 展开更多
关键词 trust Management Resources Sharing Community Cloud zero trust
在线阅读 下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security 被引量:1
7
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY Quantum Computers Post Quantum Cryptography Q-Day zero trust
在线阅读 下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
8
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
在线阅读 下载PDF
Anomaly Detection Method of Power Internet of Things Terminals in Zero-Trust Environment
9
作者 Sun Pengzhan Ren Yinlin +2 位作者 Shao Sujie Yang Chao Qiu Xuesong 《China Communications》 2026年第1期290-305,共16页
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi... With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space. 展开更多
关键词 anomaly detection distributed machine learning power internet of Things zero trust
在线阅读 下载PDF
Dissecting zero trust:research landscape and its implementation in IoT
10
作者 Chunwen Liu Ru Tan +5 位作者 Yang Wu Yun Feng Ze Jin Fangjiao Zhang Yuling Liu Qixu Liu 《Cybersecurity》 2025年第2期201-228,共28页
As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to e... As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to evaluate the current research regarding zero trust and to highlight its practical applications in the IoT sphere through extensive bibliometric analysis.We also delve into the vulnerabilities of IoT and explore the potential role of zero trust security in mitigating these risks via a thorough review of relevant security schemes.Nevertheless,the challenges associated with implementing zero trust security are acknowledged.We provide a summary of these issues and suggest possible pathways for future research aimed at overcoming these challenges.Ultimately,this study aims to serve as a strategic analysis of the zero trust model,intending to empower scholars in the field to pursue deeper and more focused research in the future. 展开更多
关键词 zero trust Research landscape Bibliometrics method Internet of things Hot topics
原文传递
Automation and Orchestration of Zero Trust Architecture:Potential Solutions and Challenges 被引量:1
11
作者 Yang Cao Shiva Raj Pokhrel +2 位作者 Ye Zhu Robin Doss Gang Li 《Machine Intelligence Research》 EI CSCD 2024年第2期294-317,共24页
Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security fie... Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access resources.ZTA is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security field.It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system.However,ZTA automation and orchestration,towards seamless deployment on real-world networks,has been limited to be reviewed in the existing literature.In this paper,we first identify the bottlenecks,discuss the background of ZTA and compare it with traditional perimeter-based security architectures.More importantly,we provide an in-depth analysis of state-of-the-art AI techniques that have the potential in the automation and orchestration of ZTA.Overall,in this review paper,we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA. 展开更多
关键词 zero trust architecture cyber security artificial intelligence access control AUTHENTICATION
原文传递
智能汽车信息物理系统的零信任安全通信
12
作者 颜文燕 谢国琪 +3 位作者 黄爽 刘新忠 徐维 雷剑梅 《汽车工程》 北大核心 2026年第2期282-295,320,共15页
智能汽车信息物理系统(cyber-physical system,CPS)的快速发展推动汽车从分布式架构向域集中式架构演进,但V2X(vehicle-to-everything)通信技术的深度应用显著加剧了智能汽车通信网络的信息安全风险,如伪造终端接入、中间人攻击及恶意... 智能汽车信息物理系统(cyber-physical system,CPS)的快速发展推动汽车从分布式架构向域集中式架构演进,但V2X(vehicle-to-everything)通信技术的深度应用显著加剧了智能汽车通信网络的信息安全风险,如伪造终端接入、中间人攻击及恶意消息注入等。为此,本文提出一种面向智能汽车CPS的零信任安全通信框架,以中央网关或云服务器为策略决策点,对接入车载通信网络实施身份认证和通信授权,确保通信的认证性、机密性、完整性及可用性。该框架采用消息标识机制,仅允许目标节点处理对应消息。基于NXP车规级交换芯片SJA1105(作为中央网关)与NXP车规级处理器S32K148176LQFP(作为域控制器)构建了智能汽车CPS实物平台,并将所开发的框架部署该原型平台,通过ProVerif工具验证了框架的安全性;基于原型平台和V2X场景验证的评估结果表明,所提框架在计算和通信开销方面均优于现有汽车信息安全通信框架。为验证框架的通用性与可扩展性,本文进一步将该零信任安全通信框架应用于空中下载(over-the-air,OTA)升级场景,构建了一个基于持续验证与动态授权的安全升级范式。 展开更多
关键词 智能汽车信息物理系统 零信任 信息安全 认证与授权
在线阅读 下载PDF
脑机接口治疗技术的零信任法律规制
13
作者 田奥妮 齐延平 《四川师范大学学报(社会科学版)》 北大核心 2026年第2期63-72,201,共11页
脑机接口治疗技术通过解码患者脑电信号实现精准控制和治疗,但在应用过程中可能存在对患者生命健康的实质损伤、精神隐私敞视及社会歧视强化等风险。该技术的全面信息化和深度算法化特性致使传统法律规制路径、医学伦理规范和技术标准... 脑机接口治疗技术通过解码患者脑电信号实现精准控制和治疗,但在应用过程中可能存在对患者生命健康的实质损伤、精神隐私敞视及社会歧视强化等风险。该技术的全面信息化和深度算法化特性致使传统法律规制路径、医学伦理规范和技术标准降效失能。零信任法律规制是法律和技术双向互嵌的架构化设计,其严格的风险规制理念契合脑机接口治疗技术应用的高风险性和低容错性,精准强制的规制架构能够弥补传统法律规范和伦理标准的不足,以患者的人性尊严价值统领架构设计,基于身份验证和最小权限实现主体风险控制,基于持续监控和动态调整实现风险过程控制。 展开更多
关键词 脑机接口治疗技术 零信任规制 医学伦理 全面信息化 深度算法化
在线阅读 下载PDF
基于零信任架构的港口工控系统设计
14
作者 马贺荣 孙松林 《信息安全研究》 北大核心 2026年第2期189-196,共8页
随着港口工业控制系统向智能化方向不断演进,传统基于边界的安全模型在攻击面扩大、权限管理僵化等方面面临严峻挑战.提出一种基于零信任架构的港口工控系统安全防护方案,融合动态信任评估、软件定义边界(software-defined perimeter,S... 随着港口工业控制系统向智能化方向不断演进,传统基于边界的安全模型在攻击面扩大、权限管理僵化等方面面临严峻挑战.提出一种基于零信任架构的港口工控系统安全防护方案,融合动态信任评估、软件定义边界(software-defined perimeter,SDP)及微隔离等技术,构建分层协同的防御体系.核心工作包括设计“终端—接入—控制—数据”4层防护架构,提出融合身份认证、设备健康度与行为特征的动态信任评估模型,并实现工业协议指令级的细粒度访问控制.实验结果表明,该方案能够将攻击面暴露率从100%降低至8%,平均认证时间缩短至0.8 s,权限调整响应时间控制在45 s以内,显著提升了港口工控系统的安全防护能力与实时运行性能. 展开更多
关键词 零信任 港口工控系统 动态访问控制 微隔离 软件定义边界 工业协议安全
在线阅读 下载PDF
等保2.0背景下数据中心信息安全架构优化研究
15
作者 陈丽 《无线互联科技》 2026年第3期34-37,66,共5页
等级保护2.0(以下简称“等保2.0”)对数据中心信息安全架构提出了合规与技术要求。文章构建四层联动架构模型,涵盖网络安全、计算环境、应用数据与安全运营4个层面,通过引入零信任访问控制、虚拟化隔离机制、数据全生命周期防护及安全... 等级保护2.0(以下简称“等保2.0”)对数据中心信息安全架构提出了合规与技术要求。文章构建四层联动架构模型,涵盖网络安全、计算环境、应用数据与安全运营4个层面,通过引入零信任访问控制、虚拟化隔离机制、数据全生命周期防护及安全编排自动化响应(Security Orchestration Automation and Response,SOAR)机制,提出了一套面向等保2.0的优化实施方案。实验结果表明,优化架构在检测率、响应效率、资源占用等关键指标上相较传统架构均有显著提升。因此,优化架构具备良好的工程适配性与合规落地能力。 展开更多
关键词 等保2.0 数据中心 信息安全架构 四层联动 零信任
在线阅读 下载PDF
零信任中基于PUF的物联网抗机器学习攻击身份认证
16
作者 司雪鸽 贾洪勇 +1 位作者 曾俊杰 李云聪 《信息安全研究》 北大核心 2026年第1期33-42,共10页
为构建高扩展物联网系统,边缘计算作为一种新兴的去中心化计算模式被引入物联网场景.零信任架构可以很好契合模糊边界的云边端系统,满足持续的动态认证并提升安全性.在频繁的认证需求下,物理不可克隆函数因其轻量化和不可克隆的特点常... 为构建高扩展物联网系统,边缘计算作为一种新兴的去中心化计算模式被引入物联网场景.零信任架构可以很好契合模糊边界的云边端系统,满足持续的动态认证并提升安全性.在频繁的认证需求下,物理不可克隆函数因其轻量化和不可克隆的特点常被用作生成设备的硬件指纹身份.物理不可克隆函数利用硬件工艺的随机因素,生成唯一且不可预测的挑战-响应对.如果攻击者在持续的认证中收集到大量的明文挑战响应对,就能建模预测接下来的响应输出而完成机器学习攻击.提出了一种基于物理不可克隆函数的认证解决方案(PAML-CA),针对抗机器学习攻击进行隐私保护增强,通过不经意伪随机函数技术实现挑战-响应对盲化传输.方案整体结构为静态与持续结合的多层动态验证方案,能够在会话中控制隐含信任域.通过安全性分析和性能对比,证明了PAML-CA较其他相关方案能够提供更好的安全性、功能、通信和计算成本. 展开更多
关键词 物联网 零信任 身份认证 物理不可克隆函数 隐私保护
在线阅读 下载PDF
环签名和IBE策略的新型电力系统匿名身份认证方案
17
作者 陈剑飞 王睿 +2 位作者 张方哲 黄华 徐光侠 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期93-99,共7页
针对现代电力系统中分布式终端数量激增、身份暴露风险高以及传统PKI密钥管理复杂等问题,提出一种融合身份加密(identity-based encryption,IBE)、环签名与零信任策略的新型分布式终端匿名身份认证方案。方案由私钥生成中心按设备身份生... 针对现代电力系统中分布式终端数量激增、身份暴露风险高以及传统PKI密钥管理复杂等问题,提出一种融合身份加密(identity-based encryption,IBE)、环签名与零信任策略的新型分布式终端匿名身份认证方案。方案由私钥生成中心按设备身份生成IBE密钥对并通过安全信道分发,简化大规模终端场景下的密钥管理;结合虚拟标识符与环签名,实现终端在环成员集合中的匿名认证;引入零信任访问控制和日志驱动的行为监测、动态权限调整及门限身份披露机制,从认证流程与访问控制两方面增强系统防护能力。形式化安全分析与性能评估结果表明,方案在保证身份匿名性、数据完整性和密钥传输安全的同时,具有较低的计算与通信开销,适用于现代电力系统分布式终端的安全接入与隐私保护需求。 展开更多
关键词 电力系统 分布式终端 基于身份的加密(IBE) 环签名 零信任策略 身份认证 匿名性
在线阅读 下载PDF
我国零信任参考体系架构理论解析及其应用
18
作者 刘军 《信息技术与标准化》 2026年第1期57-62,共6页
为解决传统边界防护失效、概念与实施混乱等问题,对零信任架构理论及我国国家标准GB/T 43696—2024《信息安全技术零信任参考体系架构》进行研究。研究表明:我国零信任参考体系架构标准以资源保护优先、任务驱动访问为核心,通过分层架构... 为解决传统边界防护失效、概念与实施混乱等问题,对零信任架构理论及我国国家标准GB/T 43696—2024《信息安全技术零信任参考体系架构》进行研究。研究表明:我国零信任参考体系架构标准以资源保护优先、任务驱动访问为核心,通过分层架构(控制层与数据层分离)及国密算法支撑,构建符合国情的零信任架构体系;通过对比NIST SP 800-207,我国标准在密码合规、细粒度资源管理(如资源单元授权)及实时威胁响应方面更具特色;探讨了当前我国零信任架构落地路径、可能存在的主要挑战以及应对策略,提出身份治理、动态策略部署、持续优化分阶段实施路径,以应对组件协同、协议兼容、成本、用户习惯等挑战,为推进我国零信任架构参考体系尽快落地提供参考。 展开更多
关键词 零信任 零信任标准 零信任架构 零信任参考体系架构 GB/T 43696—2024
在线阅读 下载PDF
财政档案信息化建设中的数据安全与隐私保护研究
19
作者 曾武 《计算机应用文摘》 2026年第1期250-252,255,共4页
财政档案信息量大、类型复杂,且包含大量涉密数据与敏感信息,因此在推进信息化、网络化、智能化的过程中,数据安全与隐私保护面临新的挑战。文章从财政档案信息化现状出发,分析当前系统在数据存储、访问控制、传输安全、权限管理及第三... 财政档案信息量大、类型复杂,且包含大量涉密数据与敏感信息,因此在推进信息化、网络化、智能化的过程中,数据安全与隐私保护面临新的挑战。文章从财政档案信息化现状出发,分析当前系统在数据存储、访问控制、传输安全、权限管理及第三方共享等方面存在的风险,提出一套面向财政档案的数据安全体系、隐私保护机制与技术实现路径,包括分级保护体系构建、AI智能脱敏、零信任访问控制、安全审计、区块链存证及容灾备份等策略。研究表明,通过技术与制度双轮驱动,可有效提升财政档案信息化建设的安全能力,保障财政数据的完整性、保密性与可用性。 展开更多
关键词 财政档案 信息化建设 数据安全 隐私保护 零信任 智能脱敏
在线阅读 下载PDF
基于零信任架构的网络安全防御系统的设计与实现
20
作者 杜奕霖 罗海涛 +2 位作者 黄炜 王伟奇 黄华豪 《移动信息》 2026年第2期82-84,共3页
随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零... 随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零信任架构的网络安全防御系统。在系统实现部分,引入基于动态信任评分模型、策略自适应调整模型以及风险—收益优化模型,使系统能够在复杂网络环境下实现“持续验证—动态调节—平衡取舍”的完整防御逻辑。最后,以某高校校园网为案例进行了测试。结果表明,该系统在降低入侵风险,提升访问安全性方面具有良好效果,为高校及其他组织的网络安全建设提供了参考。 展开更多
关键词 零信任架构 网络安全 身份认证 访问控制 高校网络
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部