{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:14:10Z","timestamp":1743077650049,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_39","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"552-563","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on 5G-Based Zero Trust Network Security Platform"],"prefix":"10.1007","author":[{"given":"Zaojian","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ziang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Wengao","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"39_CR1","first-page":"33","volume":"11","author":"Y Zuo","year":"2019","unstructured":"Zuo, Y.: Research on the application of zero-trust architecture in critical information infrastructure security protection. Secrecy Sci. Technol. 11, 33\u201338 (2019)","journal-title":"Secrecy Sci. Technol."},{"issue":"7","key":"39_CR2","first-page":"1750","volume":"53","author":"L Zeng","year":"2020","unstructured":"Zeng, L., Liu, X.: Security architecture based on zero trust. Commun. Technol. 53(7), 1750\u20131754 (2020)","journal-title":"Commun. Technol."},{"key":"39_CR3","first-page":"164","volume":"11","author":"M Ye","year":"2019","unstructured":"Ye, M.: Research on the application of zero-trust security model in the security management of central enterprises. Electron. World 11, 164\u2013165 (2019)","journal-title":"Electron. World"},{"issue":"7","key":"39_CR4","first-page":"1745","volume":"53","author":"H Liu","year":"2020","unstructured":"Liu, H., Yang, S., Liu, H.: Zero trust security architecture and application. Commun. Technol. 53(7), 1745\u20131749 (2020)","journal-title":"Commun. Technol."},{"issue":"2","key":"39_CR5","first-page":"41","volume":"39","author":"T Hong","year":"2020","unstructured":"Hong, T., Gong, W.: The method of trust evaluation based on fuzzy mathematics. Tech. Autom. Appl. 39(2), 41\u201344 (2020)","journal-title":"Tech. Autom. Appl."},{"key":"39_CR6","unstructured":"Shen, C.: Building a firm cybersecurity defense with trusted computing v3.0. Inf. Commun. Technol. 11(3), 4\u20136 (2017)"},{"issue":"3","key":"39_CR7","first-page":"125","volume":"36","author":"X He","year":"2020","unstructured":"He, X., Yue, P., Lu, Q., Yin, Y.: Evolution and key technologies of 5G-oriented IP RAN. Telecommun. Sci. 36(3), 125\u2013135 (2020)","journal-title":"Telecommun. Sci."},{"issue":"9","key":"39_CR8","first-page":"122","volume":"36","author":"P Ma","year":"2020","unstructured":"Ma, P., Wu, W., Zhang, W., Yang, G., Yang, F.: Key technologies and development of 5G bearer network. Telecommun. Sci. 36(9), 122\u2013130 (2020)","journal-title":"Telecommun. Sci."},{"issue":"8","key":"39_CR9","first-page":"43","volume":"36","author":"W Wu","year":"2020","unstructured":"Wu, W., Zhang, W., Yang, G., Ma, P., Yang, F.: SRv6 +EVPN technology research and scale deployment of 5G bearer network. Telecommunications Science 36(8), 43\u201352 (2020)","journal-title":"Telecommunications Science"},{"issue":"08","key":"39_CR10","first-page":"1127","volume":"50","author":"D Feng","year":"2020","unstructured":"Feng, D., Liu, J., Qin, Y., Feng, W.: Trusted computing theory and technology in innovation-driven development. Sci. Sinica (Inf.) 50(08), 1127\u20131147 (2020)","journal-title":"Sci. Sinica (Inf.)"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Yuan, J., Zhang, F., Yu, L., Zhang, H., Sang, Y.: Research of security of 5G-enabled Industrial Internet and Its Application. In: 2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS), pp. 428\u2013435 (2021)","DOI":"10.1109\/TOCS53301.2021.9688679"},{"key":"39_CR12","unstructured":"Barth, D., Gilman, E.: Zero Trust Networks: Building Security Systems in Untrusted Networks. O\u2019Reilly Media, Sebastopol, CA (2017)"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Wylde, A.: Zero trust: never trust, always verify. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20134 (2021)","DOI":"10.1109\/CyberSA52016.2021.9478244"},{"issue":"9","key":"39_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.23919\/JCC.2021.09.013","volume":"18","author":"W Yan","year":"2021","unstructured":"Yan, W., Shu, Q., Gao, P.: Security risk prevention and control deployment for 5G private industrial networks. China Commun. 18(9), 167\u2013174 (2021)","journal-title":"China Commun."},{"issue":"2","key":"39_CR15","first-page":"181","volume":"47","author":"C He","year":"2021","unstructured":"He, C., Peng, B., Cui, M.: Research on the design of zero trust firewall based on single packet authorization. J. Southwest Minzu Univ. (Nat. Sci. Ed.) 47(2), 181\u2013186 (2021)","journal-title":"J. Southwest Minzu Univ. (Nat. Sci. Ed.)"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Dutta, A., Hammad, E.: 5G Security challenges and opportunities: a system approach. In: 2020 IEEE 3rd 5G World Forum (5GWF), pp. 109\u2013114 (2020)","DOI":"10.1109\/5GWF49715.2020.9221122"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, D., Wang, J.: Research on security protection method of industrial control boundary network. In: 2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS), pp. 560\u2013563 (2021)","DOI":"10.1109\/TOCS53301.2021.9688640"},{"key":"39_CR18","first-page":"33","volume":"03","author":"B Zhang","year":"2021","unstructured":"Zhang, B., Zhu, X., Sun, Y., Yu, Y.: Research on practice of big data security guide. Inf. Technol. Stand. 03, 33\u201337 (2021)","journal-title":"Inf. Technol. Stand."},{"key":"39_CR19","first-page":"47","volume":"4","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Wang, Y., Xie, J.: Analysis on security of 5G network and suggestions for security scheme. Inf. Commun. Technol. Policy 4, 47\u201353 (2020)","journal-title":"Inf. Commun. Technol. Policy"},{"key":"39_CR20","doi-asserted-by":"publisher","first-page":"126","DOI":"10.2478\/popets-2020-0008","volume":"1","author":"A Singla","year":"2020","unstructured":"Singla, A., Hussain, S.R., Chowdhury, O., Bertino, E., Li, N.: Protecting the 4G and 5G cellular paging protocols against security and privacy attacks. Proc. Priv. Enhancing Technol. 1, 126\u2013142 (2020)","journal-title":"Proc. Priv. Enhancing Technol."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:11:34Z","timestamp":1685459494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}