Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
نویسندگان
چکیده
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating terminal during process not relying solely geographic location/user attributes as sole basis for assessment. However, due to fine-grained verification identity under zero-trust architecture, there is a need multiple processes. If single policy engine has unknown vulnerabilities backdoors be maliciously attacked, or DDOS attacks initiated known cannot prevented, this center meet requirements system reliability. Therefore, it proposed apply SPA single-package endogenous system, which can realize reliability, dynamism diversity defense. Through experimental antiattack analysis test, test from scheme found that when introduces improved complexity attack increase in cost attack. The through both overhead effectively improve while ensuring quality network services, compared traditional scheme. It was services better adaptability than
منابع مشابه
A security authentication method based on trust evaluation in VANETs
Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...
متن کاملturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولTrust-Based Security Protocols
An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents
متن کاملA Layered Trust Information Security Architecture
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different ...
متن کاملNetwork Security Analysis Based on Authentication Techniques
Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12040782