2022
DOI: 10.15864/ajse.3103
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Model for Zero Trust Data

Abstract: The world has realized traditional cybersecurity models are flawed because users and systems behind the perimeter are implicitly trusted. The response has been to treat access requests and behaviors post-access as untrusted. Thus, the aim of such zero trust architecture is to establish a borderless access-control framework. Accordingly, existing research is centered around network perimeters and communications layers. That is, data access channels or endpoints and not data itself. Consequently, we conducted a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…They discuss the challenges to such an architecture and expand its scope towards software-defined perimeters and micro-segmentation. Pittman et al [22] survey a novel idea, applying zero-trust tenets and principles to data objects instead of pathways that allow users to access data. They conclusively state that the calculation of trust in a dynamic system such as a network is both a classification problem and a regression problem.…”
Section: Comparison With Existing Survey Articlesmentioning
confidence: 99%
“…They discuss the challenges to such an architecture and expand its scope towards software-defined perimeters and micro-segmentation. Pittman et al [22] survey a novel idea, applying zero-trust tenets and principles to data objects instead of pathways that allow users to access data. They conclusively state that the calculation of trust in a dynamic system such as a network is both a classification problem and a regression problem.…”
Section: Comparison With Existing Survey Articlesmentioning
confidence: 99%