认证
计算机科学
特权(计算)
计算机安全
认证(法律)
网络钓鱼
零(语言学)
钥匙(锁)
资产(计算机安全)
云计算
领域(数学)
功能(生物学)
互联网
万维网
数学
政治学
进化生物学
语言学
生物
操作系统
哲学
法学
纯数学
作者
Xiao-Hai Yan,Huijuan Wang
出处
期刊:Communications in computer and information science
日期:2020-01-01
卷期号:: 50-60
被引量:11
标识
DOI:10.1007/978-981-15-8083-3_5
摘要
As a promising tool to cope with the current phishing attacks, zero-trust is gradually being taken seriously while the situation of network security becoming more and more severe. In zero trust, no unit is fully trusted even if it passes the certification. They only have the least privilege, access to data requires authentication, these processes need to be logged. This paper performs a typical survey of the composition and key technologies of zero trust, and combines the application of this technology in some scenarios to introduce the advantages of zero trust, such as big data function, cloud network and IoT. Moreover, this paper also discusses some of the challenging research issues in the field that can provide ideas for future researchers.
科研通智能强力驱动
Strongly Powered by AbleSci AI