2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA) 2021
DOI: 10.1109/icsgea53208.2021.00021
|View full text |Cite
|
Sign up to set email alerts
|

Research on the Security Protection Framework of Power Mobile Internet Services Based on Zero Trust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Emerging technologies such as attribute-based dynamic access control (DABAC) and risk-based access control (RAC) are also emerging on the horizon. DABAC enables more flexible access control [24,25] by dynamically managing and adjusting user attributes. RAC, on the other hand, relies on risk assessment and more intelligently and dynamically adjusts visits to the changing threat environment.…”
Section: Current Status Of Access Control Technologymentioning
confidence: 99%
“…Emerging technologies such as attribute-based dynamic access control (DABAC) and risk-based access control (RAC) are also emerging on the horizon. DABAC enables more flexible access control [24,25] by dynamically managing and adjusting user attributes. RAC, on the other hand, relies on risk assessment and more intelligently and dynamically adjusts visits to the changing threat environment.…”
Section: Current Status Of Access Control Technologymentioning
confidence: 99%
“…A dynamic access control strategy based on the zero-trust optical verification network model [ 5 ] combines the segmentation method with the zero-trust model so that the system can obtain the ability to control access to valuable assets of the organization or industry. The security protection framework of electric power mobile Internet service based on zero trust [ 6 ] makes a collaborative analysis of the key points of security protection based on zero trust from multiple perspectives, such as users, terminals, and applications, and designs multiple dimensions of identity security authentication, continuous trust evaluation, and fine-grained access control, which provides theoretical guidance for the security protection of electric power mobile service. Based on the abstract model of zero-trust architecture and information security technology, a prototype [ 7 ] was implemented for the IOS terminal to access enterprise resources in remote office mode securely.…”
Section: Related Workmentioning
confidence: 99%
“…[31] performed risk analysis in various levels of power mobile internet applications and presented a zero‐trust‐based security protection framework Figure 2 to provide logical identities to multiple individuals, devices, and applications by combining the two components of identity recognition and access control with finer granularity based on identity trust. Similarly, [22] proposed a risk‐based access control enforcement system to address future security needs, specifically zero‐trust networks.…”
Section: Literature Reviewmentioning
confidence: 99%