Survey on Zero-Trust Network Security

23Citations
Citations of this article
53Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As a promising tool to cope with the current phishing attacks, zero-trust is gradually being taken seriously while the situation of network security becoming more and more severe. In zero trust, no unit is fully trusted even if it passes the certification. They only have the least privilege, access to data requires authentication, these processes need to be logged. This paper performs a typical survey of the composition and key technologies of zero trust, and combines the application of this technology in some scenarios to introduce the advantages of zero trust, such as big data function, cloud network and IoT. Moreover, this paper also discusses some of the challenging research issues in the field that can provide ideas for future researchers.

Cite

CITATION STYLE

APA

Yan, X., & Wang, H. (2020). Survey on Zero-Trust Network Security. In Communications in Computer and Information Science (Vol. 1252 CCIS, pp. 50–60). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-8083-3_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free