1 |
MILLER K W, VOAS J, HURLBURT G F. BYOD: security and privacy considerations[J]. IT Professional, 2012, 14(5): 53-55.
|
2 |
MOHAMAD NOOR M B, HASSAN W H. Current research on Internet of Things (IoT) security: a survey[J]. Computer Networks, 2019, 148: 283-294.
|
3 |
SINGH K K V V, GUPTA H. A new approach for the security of VPN[C]// Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies. New York: ACM, 2016: No.13.
|
4 |
MEHRAJ S, BANDAY M T. Establishing a zero trust strategy in cloud computing environment[C]// Proceedings of the 2020 International Conference on Computer Communication and Informatics. Piscataway: IEEE, 2020: 1-6.
|
5 |
ROSE S, BORCHERT O, MITCHELL S, et al. Zero trust architecture NIST special publication 800-207[EB/OL]. [2023-11-12]. .
|
6 |
STAFFORD V A. Zero trust architecture[J]. NIST Special Publication, 2020, 800: 207.
|
7 |
YAVATKAR R, PENDARAKIS D, GUERIN R. A framework for policy-based admission control: RFC 2753 [S]. Reston, VA: Internet Society, 2000-01.
|
8 |
SYED N F, SHAH S W, SHAGHAGHI A, et al. Zero Trust Architecture (ZTA): a comprehensive survey[J]. IEEE Access, 2022, 10: 57143-57179.
|
9 |
BUCK C, OLENBERGER C, SCHWEIZER A, et al. Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust[J]. Computers and Security, 2021, 110: No.102436.
|
10 |
KINDERVAG J. Build security into your network’s DNA: the zero trust network architecture[EB/OL]. [2023-11-13]. .
|
11 |
李璇. Gartner发布2022-2023年八大网络安全趋势预测[EB/OL]. [2023-11-12]. .
|
12 |
BAU J, MITCHELL J C. Security modeling and analysis[J]. IEEE Security and Privacy, 2011, 9(3): 18-25.
|
13 |
LI S, IQBAL M, SAXENA N. Future industry internet of things with zero-trust security[J/OL]. Information Systems Frontiers(2022-03-10)[2024-05-01]. .
|
14 |
YAN X, WANG H. Survey on zero-trust network security[C]// Proceedings of the 2020 International Conference on Artificial Intelligence and Security, CCIS 1252. Singapore: Springer, 2020: 50-60.
|
15 |
YAO Q, WANG Q, ZHANG X, et al. Dynamic access control and authorization system based on zero-trust architecture[C]// Proceedings of the 1st International Conference on Control, Robotics and Intelligent System. New York: ACM, 2020: 123-127.
|
16 |
SOMANI G, GAUR M S, SANGHI D, et al. DDoS attacks in cloud computing: issues, taxonomy, and future directions[J]. Computer Communications, 2017, 107: 30-48.
|
17 |
方滨兴,崔翔,王威. 僵尸网络综述[J]. 计算机研究与发展, 2011, 48(8): 1315-1331.
|
18 |
DENNING D E R. Cryptography and data security[M]. Boston: Addison-Wesley, 1982.
|
19 |
BOURKE J, WESSELY S. Confidentiality[J]. BMJ, 2008, 336: 888-891.
|
20 |
HE Y, HUANG D, CHEN L, et al. A survey on zero trust architecture: challenges and future trends[J]. Wireless Communications and Mobile Computing, 2022, 2022: No.6476274.
|
21 |
McFALL L. Integrity[J]. Ethics, 1987, 98(1): 5-20.
|
22 |
ALEVIZOS L, TA V T, HASHEM EIZA M. Augmenting zero trust architecture to endpoints using blockchain: a state-of-the-art review[J]. Security and Privacy, 2022, 5(1): No.e191.
|
23 |
郭雪,吴倩琳,孔松. 零信任的行业应用场景分析研究[J]. 中国信息安全, 2022(2): 36-38.
|
24 |
CHUAN T, LV Y, QI Z, et al. An implementation method of zero-trust architecture[J]. Journal of Physics: Conference Series, 2020, 1651: No.012010.
|
25 |
苗功勋,蔡力兵,魏敬伟. 基于零信任的企业安全上云融合解决方案研究[J]. 保密科学技术, 2021(8): 24-32.
|
26 |
张刘天,陈丹伟. 基于零信任的动态访问控制模型研究[J]. 信息安全研究, 2022, 8(10): 1008-1017.
|
27 |
ALPEROVITCH D. Revealed: operation Shady RAT[R/OL]. [2023-11-09]. .
|
28 |
WARD R, BEYER B. BeyondCorp: a new approach to enterprise security[J]. ;login:, 2014, 39(6): 6-11.
|
29 |
PETTIT J, PFAFF B, STRINGER J, et al. Bringing platform harmony to VMware NSX[J]. ACM SIGOPS Operating Systems Review, 2018, 52(1): 123-128.
|
30 |
KEERIYATTIL S. Microsegmentation and zero trust: introduction[M]// Zero trust networks with VMware NSX: build highly secure network architectures for your data centers. Berkely: Apress, 2019: 17-31.
|
31 |
MOUBAYED A, REFAEY A, SHAMI A. Software-Defined Perimeter (SDP): state of the art secure solution for modern networks[J]. IEEE Network, 2019, 33(5): 226-233.
|
32 |
CONDE D. Software-defined perimeters: an architectural view of SDP[J/OL]. IEEE Softwarization [2024-05-02]. .
|
33 |
SALLAM A, REFAEY A, SHAMI A. On the security of SDN: a completed secure and scalable framework using the software-defined perimeter[J]. IEEE Access, 2019, 7: 146577-146587.
|
34 |
王斯梁,冯暄,蔡友保,等. 零信任安全模型解析及应用研究[J]. 信息安全研究, 2020, 6(11): 966-971.
|
35 |
李聪聪,纪寿文,范修斌,等. 认证体制综述[J]. 信息安全研究, 2016, 2(7): 649-659.
|
36 |
赵军. 路由劫持故障及类似故障处理[J]. 和田师范专科学校学报, 2010, 29(6): 246-246.
|
37 |
MILLER J F. Supply chain attack framework and attack patterns: MTR140021[R/OL]. [2023-11-13]. .
|
38 |
TEERAKANOK S, UEHARA T, INOMATA A. Migrating to zero trust architecture: reviews and challenges[J]. Security and Communication Networks, 2021, 2021: No.9947347.
|