[1]王斯梁, 冯暄, 蔡友保, 等. 零信任安全模型解析及应用研究[J]. 信息安全研究, 2020, 6(11): 966971[2]Bobbert Y, Scheerder J. Zero trust validation: From practice to theory: An empirical research project to improve zero trust implementations[C] Proc of the 29th IEEE Annual Software Technology Conference. Piscataway, NJ: IEEE, 2022: 93104[3]诸葛程晨, 王群, 刘家银, 等. 零信任网络综述[J]. 计算机工程与应用, 2022, 58(22): 1229[4]Munasinghe S, Piyarathna N, Wijerathne E, et al. Machine learning based zero trust architecture for secure networking[C] Proc of the 17th IEEE Int Conf on Industrial and Information Systems. Piscataway, NJ: IEEE, 2023: 16[5]He Yuanhang, Huang Daochao, Chen Lei, et al. A survey on zero trust archiecture[J]. Wireless Communications and Mobile Computing, 2022, 2022(1): 113[6]Yao Qigui, Wang Qi, Zhang Xiaojian, et al. Dynamic access control and authorization system based on zerotrust architecture[C] Procs of the 2020 Int Conf on Control, Robotics and Intelligent System, New York: ACM, 2020: 123127[7]张刘天, 陈丹伟. 基于零信任的动态访问控制模型研究[J]. 信息安全研究, 2022, 8(10): 10081017[8]林奕夫, 陈雪, 许媛媛, 等. 基于零信任的动态访问控制模型研究[J]. 信息安全研究, 2024, 10(1): 8893[9]Yunanto W, Pao H K. User behavior risk evaluation in zero trust architecture environment[C] Proc of the 8th IEEE World Forum on Internet of Things. Piscataway, NJ: IEEE, 2022: 16[10]Zhang Chenxin, He Jie, Fan Baixiang, et al. Tagbased trust evaluation in zero trust architecture[C] Proc of the 4th Int Academic Exchange Conf on Science and Technology Innovation. Piscataway, NJ: IEEE, 2022: 772776[11]张宇, 张妍. 零信任研究综述[J]. 信息安全研究, 2020, 6(7): 608614[12]马俊辉. 基于零信任架构的智能家居动态访问控制模型[D]. 天津: 天津大学, 2021 |