[1] Forum J. Jericho Forum™ Commandments [EB/OL]. [2020-05-31].https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf
[2] Polalto. Zero Trust Network Architecture with John Kindervag - Video[EB/OL]. [2020-05-31]. https://www.paloaltonetworks.com/resources/videos/zero-trust
[3] Rose S, Borchert O, Mitchell S, et al. Zero Trust Architecture[M]. Gaithersburg, MD: National Institute of Standards and Technology, 2020
[4] Ward R, Beyer B. Beyondcorp: A new approach to enterprise security[J]. Login the Magazine of Usenix & Sage, 2014,39:6-11
[5] Ward R, Beyer B. Beyondcorp: A new approach to enterprise security[J]. Login the Magazine of Usenix & Sage, 2014,39:6-11
[5] Lucion E L R, Nunes R C. Software defined perimeter: Improvements in the security of single packet authorization and user authentication[C]//Proc of XLIV Latin American Computer Conf (CLEI). Piscataway,NJ:IEEE, 2018: 708-717
[6] Kerner S M . Cloud security alliance defends cloud With software defined perimeter[J]. Eweek, 2013
[7] Zscaler. The challenge with today’s network security in a cloud-first world[EB/OL]. [2020-05-31]. https://www.zscaler.com/products/zscaler-internet-access
[7] Zscaler. The challenge with today’s network security in a cloud-first world[EB/OL]. [2020-05-31]. https://www.zscaler.com/products/zscaler-internet-access
[8] 薛朝晖, 向敏. 零信任安全模型下的数据中心安全防护研究[J]. 通信技术, 2017,50(6):1290-1294
[9] 叶马力. 零信任安全模型在央企安全管理中的应用研究[J]. 电子世界, 2019(11):164-165
[10] 向人鹏. 基于“零信任”的工业信息安全防护研究[C]// 2019电力行业信息化年会论文集.北京;人民邮电出版社, 2019
[11] 钟翔, 郭玮, 马勇, 等. 基于零信任安全架构的机场网络安全防护方案[J]. 民航学报, 2019,3(3):114-116
[12] 李聪聪, 纪寿文, 范修斌, 等. 认证体制综述[J]. 信息安全研究, 2016,2(7):649-659
[13] 沈海波, 洪帆. 访问控制模型研究综述[J]. 计算机应用研究, 2005(6):9-11
[14] Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control[J]. ACM Transon Information and System Security (TISSEC), 2001,4(3):224-274
[15] Yu-Fang M B S. Role based Access Control Model [J]. Computer Science, 2003,1
[16] Priebe T , Dobmeier W , Kamprath N . Supporting attribute-based access control with ontologies[C]// Proc of the 1st Int Conf on Availability, Reliability and Security. Piscataway,NJ:IEEE, 2006
[17] 王小明, 付红, 张立臣. 基于属性的访问控制研究进展[J]. 电子学报, 2010(7):190-197
[18] Norvig P, Russell S. Artificial intelligence: A modern approach (all inclusive), 3/E[J]. Applied mechanics & Materials, 1995,263(5):2829-2833
|