{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:26:16Z","timestamp":1757622376974,"version":"3.44.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006325"},{"type":"electronic","value":"9783032006332"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00633-2_19","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:31Z","timestamp":1754648131000},"page":"324-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Transmission Scheduling Method for\u00a0High-Concurrent Zero Trust Access Control"],"prefix":"10.1007","author":[{"given":"Taisho","family":"Sasada","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Kiennert","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Blanc","sequence":"additional","affiliation":[]},{"given":"Yuzo","family":"Taenaka","sequence":"additional","affiliation":[]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"issue":"2","key":"19_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44227-024-00032-1","volume":"12","author":"F Alharbi","year":"2024","unstructured":"Alharbi, F., Kashyap, G.S.: Empowering network security through advanced analysis of malware samples: leveraging system metrics and network log data for informed decision-making. Int. J. Netw. Distrib. Comput. 12(2), 1\u201315 (2024)","journal-title":"Int. J. Netw. Distrib. Comput."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"102490","DOI":"10.1016\/j.cose.2021.102490","volume":"111","author":"C Beaman","year":"2021","unstructured":"Beaman, C., Barkworth, A., Akande, T.D., Hakak, S., Khan, M.K.: Ransomware: recent advances, analysis, challenges and future research directions. Comput. Secur. 111, 102490 (2021)","journal-title":"Comput. Secur."},{"issue":"1","key":"19_CR3","first-page":"9947347","volume":"2021","author":"S Teerakanok","year":"2021","unstructured":"Teerakanok, S., Uehara, T., Inomata, A.: Migrating to zero trust architecture: reviews and challenges. Secur. Commun. Netw. 2021(1), 9947347 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Yao, Q., Wang, Q., Zhang, X., Fei, J.: Dynamic access control and authorization system based on zero-trust architecture. In: Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, pp. 123\u2013127 (2020)","DOI":"10.1145\/3437802.3437824"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Sasada, T., Masuda, Y., Taenaka, Y., Kadobayashi, Y., Fall, D.: Zero-trust access control focusing on imbalanced distribution in browser clickstreams. In: 2021 Eighth International Conference on Software Defined Systems, pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/SDS54264.2021.9732109"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"109068","DOI":"10.1016\/j.comnet.2022.109068","volume":"212","author":"P Garc\u00eda-Teodoro","year":"2022","unstructured":"Garc\u00eda-Teodoro, P., Camacho, J., Maci\u00e1-Fern\u00e1ndez, G., G\u00f3mez-Hern\u00e1ndez, J.A., L\u00f3pez-Mar\u00edn, V.J.: A novel zero-trust network access control scheme based on the security profile of devices and users. Comput. Netw. 212, 109068 (2022)","journal-title":"Comput. Netw."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"103161","DOI":"10.1016\/j.adhoc.2023.103161","volume":"145","author":"W Huang","year":"2023","unstructured":"Huang, W., Xie, X., Wang, Z., Feng, J.Y., Han, G., Zhang, W.: ZT-access: a combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments. Ad Hoc Netw. 145, 103161 (2023)","journal-title":"Ad Hoc Netw."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"141358","DOI":"10.1109\/ACCESS.2023.3341093","volume":"11","author":"T Sasada","year":"2023","unstructured":"Sasada, T., Kawai, M., Masuda, Y., Taenaka, Y., Kadobayashi, Y.: Factor analysis of learning motivation difference on cybersecurity training with zero trust architecture. IEEE Access 11, 141358\u2013141374 (2023)","journal-title":"IEEE Access"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Matiushin, I., Korkhov, V.: Continuous authentication methods for zero-trust cybersecurity architecture. In: International Conference on Computational Science and Its Applications, pp. 334\u2013351. Springer (2023)","DOI":"10.1007\/978-3-031-37120-2_22"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Sasada, T., Taenaka, Y., Kadobayashi, Y., Fall, D.: Web-biometrics for user authenticity verification in zero trust access control. IEEE Access, 129611\u2013129622 (2024)","DOI":"10.1109\/ACCESS.2024.3413696"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"6476274","DOI":"10.1155\/2022\/6476274","volume":"2022","author":"Y He","year":"2022","unstructured":"He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: challenges and future trends. Wirel. Commun. Mob. Comput. 2022(1), 6476274 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Akibis, M., Pereira, J., Clark, D., Mitchell, V., Alvarez, H.: An automated approach, measuring ransomware propagation patterns via network traffic analysis (2024)","DOI":"10.21203\/rs.3.rs-5180048\/v1"},{"key":"19_CR13","unstructured":"Scott, R., Oliver, B., Stu, M., Sean, C.: NIST SP800-207: Zero Trust Architecture, Technical report, National Institute of Standards and Technology (2020)"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"101227","DOI":"10.1016\/j.iot.2024.101227","volume":"27","author":"MA Azad","year":"2024","unstructured":"Azad, M.A., Abdullah, S., Arshad, J., Lallie, H., Ahmed, Y.H.: Verify and trust: a multidimensional survey of zero-trust security in the age of IoT. Internet Things 27, 101227 (2024)","journal-title":"Internet Things"},{"issue":"8","key":"19_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.23919\/JCC.2022.08.015","volume":"19","author":"L Meng","year":"2022","unstructured":"Meng, L., Huang, D., An, J., Zhou, X., Lin, F.: A continuous authentication protocol without trust authority for zero trust architecture. Chin. Commun. 19(8), 198\u2013213 (2022)","journal-title":"Chin. Commun."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Kataoka, S., Kotani, D., Okabe, Y.: NI-SPA: SPA-based dynamic access control utilizing in-network behavior. In: Proceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications, pp. 19\u201324 (2024)","DOI":"10.1145\/3672200.3673876"},{"issue":"4","key":"19_CR17","doi-asserted-by":"publisher","first-page":"782","DOI":"10.3390\/electronics12040782","volume":"12","author":"X Mingyang","year":"2023","unstructured":"Mingyang, X., Guo, J., Yuan, H., Yang, X.: Zero-trust security authentication based on SPA and endogenous security architecture. Electronics 12(4), 782 (2023)","journal-title":"Electronics"},{"issue":"4","key":"19_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.32996\/jcsts.2024.6.4.8","volume":"6","author":"T Bashir","year":"2024","unstructured":"Bashir, T.: Zero trust architecture: enhancing cybersecurity in enterprise networks. J. Comput. Sci. Technol. Stud. 6(4), 54\u201359 (2024)","journal-title":"J. Comput. Sci. Technol. Stud."},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/3561799","volume":"20","author":"M Bush","year":"2022","unstructured":"Bush, M., Mashatan, A.: From zero to one hundred: demystifying zero trust and its implications on enterprise people, process, and technology. Queue 20(4), 80\u2013106 (2022)","journal-title":"Queue"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Ge, Y., Zhu, Q.: Trust threshold policy for explainable and adaptive zero-trust defense in enterprise networks. In: 2022 IEEE Conference on Communications and Network Security (CNS), pp. 359\u2013364. IEEE (2022)","DOI":"10.1109\/CNS56114.2022.9947263"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Krmelj, G.R., Pan\u010dur, M., Grohar, M., Ciglari\u010d, M.: OpenSPA - an open and extensible protocol for single packet authorization. In: Proceedings of the Central European Cybersecurity Conference 2018, pp. 1\u20136 (2018)","DOI":"10.1145\/3277570.3277574"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00633-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:36:47Z","timestamp":1757360207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00633-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006325","9783032006332"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00633-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}