1. "Zero Trust Architecture" by John Kindervag. This paper outlines the principles of a zero trust architecture, which assumes that all users and devices are untrusted and must be authenticated and authorized before accessing resources. It has been widely cited as a foundational work in the field of zero trust security.

  2. "Zero Trust Networking" by Jason Garbis. This paper discusses the application of zero trust principles to network security, including the use of micro-segmentation to limit lateral movement and the need for continuous monitoring and assessment of network traffic.

  3. "Zero Trust: Moving Beyond Perimeter Security" by Chase Cunningham. This paper argues that traditional perimeter-based security models are no longer sufficient in the age of cloud computing and remote workforces, and that a zero trust approach is necessary to protect sensitive data and systems.

  4. "The Evolution of Zero Trust" by Wendy Nather. This paper provides a historical overview of the zero trust concept, tracing its development from a niche security model to a mainstream approach embraced by organizations of all sizes.

  5. "Zero Trust Security: A New Paradigm for Securing Today's Datacenter" by Chris Van Der Walt and Mattias Fridstrom. This paper discusses the application of zero trust principles to datacenter security, including the use of identity-based policies and the need for automated enforcement and response mechanisms. It has been cited as a key resource for organizations seeking to implement zero trust security in their datacenters

关于教育信息化中的零信任研究有哪些类型请推荐5篇引用率较高的英文文献并介绍

原文地址: https://www.cveoy.top/t/topic/fb8D 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录