Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture

نویسندگان

چکیده

Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating terminal during process not relying solely geographic location/user attributes as sole basis for assessment. However, due to fine-grained verification identity under zero-trust architecture, there is a need multiple processes. If single policy engine has unknown vulnerabilities backdoors be maliciously attacked, or DDOS attacks initiated known cannot prevented, this center meet requirements system reliability. Therefore, it proposed apply SPA single-package endogenous system, which can realize reliability, dynamism diversity defense. Through experimental antiattack analysis test, test from scheme found that when introduces improved complexity attack increase in cost attack. The through both overhead effectively improve while ensuring quality network services, compared traditional scheme. It was services better adaptability than

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A security authentication method based on trust evaluation in VANETs

Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...

متن کامل

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

Trust-Based Security Protocols

An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents

متن کامل

A Layered Trust Information Security Architecture

Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different ...

متن کامل

Network Security Analysis Based on Authentication Techniques

Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12040782