Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Zero trust network security: from theory to practice
Zhiyang FANG, Leyan FANG, Xiang YANG
Journal of Computer Applications    0, (): 88-94.   DOI: 10.11772/j.issn.1001-9081.2023111617
Abstract27)   HTML1)    PDF (2415KB)(51)       Save

As an emerging cybersecurity concept, Zero Trust (ZT) aims at changing the traditional “trust but verify” mode to achieve stricter access control and security defense in networks. The ZT architectures are based on the fundamental premise of not trusting any user, device, or network, and requiring user identity verification and fine-grained authorization control for every access request. First, an elaboration on the concept and core principles of ZT was carried out. Then, the main application scenarios and components of the ZT architectures were introduced, as well as the working principles of these architectures. At the same time, the existing ZT architectures were compared and analyzed, for understanding the specific implementation methods of the ZT concept and providing valuable references for constructing ZT architectures. Finally, the limitations of the ZT architectures were summarized, thereby providing directions for optimizing the application of ZT.

Table and Figures | Reference | Related Articles | Metrics