{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:21:21Z","timestamp":1778167281090,"version":"3.51.4"},"reference-count":198,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10922-025-09998-x","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T06:32:09Z","timestamp":1763015529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Zero Trust Architecture: A Systematic Literature Review"],"prefix":"10.1007","volume":"34","author":[{"given":"Muhammad Liman","family":"Gambo","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Almulhem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"9998_CR1","doi-asserted-by":"publisher","first-page":"19487","DOI":"10.1109\/ACCESS.2023.3248622","volume":"11","author":"P Phiayura","year":"2023","unstructured":"Phiayura, P., Teerakanok, S.: A comprehensive framework for migrating to zero trust architecture. IEEE Access 11, 19487\u201319511 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3248622","journal-title":"IEEE Access"},{"key":"9998_CR2","doi-asserted-by":"publisher","unstructured":"Kumar, R., Sharma, R.: A comprehensive approach to industry 4.0 security: blockchain and dynamic access control integration. 2024 Sixth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp. 477\u2013484 (2024). https:\/\/doi.org\/10.1109\/CCICT62777.2024.00080","DOI":"10.1109\/CCICT62777.2024.00080"},{"issue":"1","key":"9998_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-024-00212-0","volume":"7","author":"C Liu","year":"2024","unstructured":"Liu, C., Tan, R., Wu, Y., Feng, Y., Jin, Z., Zhang, F., Liu, Y., Liu, Q.: Dissecting zero trust: research landscape and its implementation in iot. Cybersecurity 7(1), 20 (2024). https:\/\/doi.org\/10.1186\/s42400-024-00212-0","journal-title":"Cybersecurity"},{"key":"9998_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103832","volume":"89","author":"EB Fernandez","year":"2024","unstructured":"Fernandez, E.B., Brazhuk, A.: A critical analysis of zero trust architecture (ZTA). Comput. Stand. Interfaces 89, 103832 (2024). https:\/\/doi.org\/10.1016\/j.csi.2024.103832","journal-title":"Comput. Stand. Interfaces"},{"key":"9998_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103414","volume":"156","author":"C Zanasi","year":"2024","unstructured":"Zanasi, C., Russo, S., Colajanni, M.: Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Netw. 156, 103414 (2024). https:\/\/doi.org\/10.1016\/j.adhoc.2024.103414","journal-title":"Ad Hoc Netw."},{"key":"9998_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101227","volume":"27","author":"MA Azad","year":"2024","unstructured":"Azad, M.A., Abdullah, S., Arshad, J., Lallie, H., Ahmed, Y.H.: Verify and trust: A multidimensional survey of zero-trust security in the age of iot. Internet of Things 27, 101227 (2024). https:\/\/doi.org\/10.1016\/j.iot.2024.101227","journal-title":"Internet of Things"},{"key":"9998_CR7","doi-asserted-by":"publisher","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","volume":"10","author":"NF Syed","year":"2022","unstructured":"Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: Zero trust architecture (zta): A comprehensive survey. IEEE Access 10, 57143\u201357179 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3174679","journal-title":"IEEE Access"},{"issue":"1","key":"9998_CR8","doi-asserted-by":"publisher","first-page":"9947347","DOI":"10.1155\/2021\/9947347","volume":"2021","author":"S Teerakanok","year":"2021","unstructured":"Teerakanok, S., Uehara, T., Inomata, A.: Migrating to zero trust architecture: Reviews and challenges. Security and Communication Networks 2021(1), 9947347 (2021). https:\/\/doi.org\/10.1155\/2021\/9947347","journal-title":"Security and Communication Networks"},{"issue":"5","key":"9998_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MSEC.2021.3091195","volume":"19","author":"E Bertino","year":"2021","unstructured":"Bertino, E.: Zero trust architecture: Does it help? IEEE Security & Privacy 19(5), 95\u201396 (2021). https:\/\/doi.org\/10.1109\/MSEC.2021.3091195","journal-title":"IEEE Security & Privacy"},{"key":"9998_CR10","unstructured":"DoD: Office of Management and Budget - Federal Zero Trust Strategy. https:\/\/zerotrust.cyber.gov\/downloads\/Office%20of%20Management%20and%20Budget%20-%20Federal%20Zero%20Trust%20Strategy%20-%20DRAFT%20For%20Public%20Comment%20-%202021-09-07.pdf (2021)"},{"key":"9998_CR11","unstructured":"DISA, NSA: Department of Defense (DoD) Zero Trust Reference Architecture v2.0 (2022). https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v2.0(U)_Sep22.pdf"},{"key":"9998_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, B., Yang, S., Zheng, X., Wang, X.: Stca: Stacked token-based continuous authentication protocol for zero trust iot. 2024 IEEE Wireless Communications and Networking Conference (WCNC), 1\u20136 (2024). https:\/\/doi.org\/10.1109\/WCNC57260.2024.10571244","DOI":"10.1109\/WCNC57260.2024.10571244"},{"key":"9998_CR13","doi-asserted-by":"publisher","unstructured":"Murray, V., Lathrop, S., Mikulski, D.: Towards deployment of a zero-trust architecture (zta) for automated vehicles (av). 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium (2023). https:\/\/doi.org\/10.4271\/2024-01-4115","DOI":"10.4271\/2024-01-4115"},{"key":"9998_CR14","doi-asserted-by":"publisher","unstructured":"James, M., Newe, T., O\u2019Shea, D., O\u2019Mahony, G.D.: Authentication and authorization in zero trust iot: A survey. 2024 35th Irish Signals and Systems Conference (ISSC), 1\u20137 (2024). https:\/\/doi.org\/10.1109\/ISSC61953.2024.10603175","DOI":"10.1109\/ISSC61953.2024.10603175"},{"key":"9998_CR15","doi-asserted-by":"publisher","first-page":"94753","DOI":"10.1109\/ACCESS.2024.3425350","volume":"12","author":"N Nahar","year":"2024","unstructured":"Nahar, N., Andersson, K., Schel\u00e9n, O., Saguna, S.: A survey on zero trust architecture: Applications and challenges of 6g networks. IEEE Access 12, 94753\u201394764 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3425350","journal-title":"IEEE Access"},{"key":"9998_CR16","doi-asserted-by":"crossref","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture. Tech. rep., National Institute of Standards and Technology, Gaithersburg, MD (2020). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207A.pdf","DOI":"10.6028\/NIST.SP.800-207-draft2"},{"issue":"1","key":"9998_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10922-021-09607-7","volume":"29","author":"M Repetto","year":"2021","unstructured":"Repetto, M., Striccoli, D., Piro, G., et al.: An autonomous cybersecurity framework for next-generation digital service chains. J. Netw. Syst. Manage. 29(1), 37 (2021). https:\/\/doi.org\/10.1007\/s10922-021-09607-7","journal-title":"J. Netw. Syst. Manage."},{"key":"9998_CR18","unstructured":"Gartner: Gartner Survey Reveals 63% of Organizations Worldwide Have Implemented a Zero Trust Strategy (2024). https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-04-22-gartner-survey-reveals-63-percent-of-organizations-worldwide-have-implemented-a-zero-trust-strategy"},{"key":"9998_CR19","unstructured":"Statista Research Department: Global Zero Trust security market value in 2023 and 2032 (2024). https:\/\/www.statista.com\/statistics\/1299061\/global-zero-trust-security-market-value\/"},{"key":"9998_CR20","doi-asserted-by":"publisher","unstructured":"Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K.U., Hamid, Y.: A review and comparative analysis of relevant approaches of zero trust network model. Sensors 24(4) (2024) https:\/\/doi.org\/10.3390\/s24041328","DOI":"10.3390\/s24041328"},{"issue":"1","key":"9998_CR21","doi-asserted-by":"publisher","first-page":"6476274","DOI":"10.1155\/2022\/6476274","volume":"2022","author":"Y He","year":"2022","unstructured":"He, Y., Huang, D., Chen, L., Ni, Y., Ma, X.: A survey on zero trust architecture: Challenges and future trends. Wirel. Commun. Mob. Comput. 2022(1), 6476274 (2022). https:\/\/doi.org\/10.1155\/2022\/6476274","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"9998_CR22","doi-asserted-by":"publisher","unstructured":"Huber, B., Kandah, F.: Zero trust+: A trusted-based zero trust architecture for iot at scale. 2024 IEEE International Conference on Consumer Electronics (ICCE), 1\u20136 (2024). https:\/\/doi.org\/10.1109\/ICCE59016.2024.10444321","DOI":"10.1109\/ICCE59016.2024.10444321"},{"issue":"2","key":"9998_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MWC.001.2300405","volume":"31","author":"M Hussain","year":"2024","unstructured":"Hussain, M., Pal, S., Jadidi, Z., Foo, E., Kanhere, S.: Federated zero trust architecture using artificial intelligence. IEEE Wirel. Commun. 31(2), 30\u201335 (2024). https:\/\/doi.org\/10.1109\/MWC.001.2300405","journal-title":"IEEE Wirel. Commun."},{"key":"9998_CR24","doi-asserted-by":"publisher","unstructured":"Bertino, E., Brancik, K.: Services for zero trust architectures - a research roadmap. 2021 IEEE International Conference on Web Services (ICWS), 14\u201320 (2021). https:\/\/doi.org\/10.1109\/ICWS53863.2021.00016","DOI":"10.1109\/ICWS53863.2021.00016"},{"key":"9998_CR25","doi-asserted-by":"publisher","unstructured":"Yeoh, W., Liu, M., Shore, M., Jiang, F.: Zero trust cybersecurity: Critical success factors and a maturity assessment framework. Comput. Secur. 133(C) (2023) https:\/\/doi.org\/10.1016\/j.cose.2023.103412","DOI":"10.1016\/j.cose.2023.103412"},{"issue":"3","key":"9998_CR26","doi-asserted-by":"publisher","first-page":"762","DOI":"10.3390\/jcp4030035","volume":"4","author":"EW Tomlinson","year":"2024","unstructured":"Tomlinson, E.W., Abrha, W.D., Kim, S.D., Ortega, S.A.: Cybersecurity access control: Framework analysis in a healthcare institution. Journal of Cybersecurity and Privacy 4(3), 762\u2013776 (2024). https:\/\/doi.org\/10.3390\/jcp4030035","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"9998_CR27","doi-asserted-by":"publisher","unstructured":"Shipman, M.E., Millwater, N., Owens, K., Smith, S.: A zero trust architecture for automotive networks. In: WCX SAE World Congress Experience (2024). https:\/\/doi.org\/10.4271\/2024-01-2793","DOI":"10.4271\/2024-01-2793"},{"issue":"9","key":"9998_CR28","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.3837\/tiis.2024.09.011","volume":"18","author":"Y Kim","year":"2024","unstructured":"Kim, Y., Sohn, S.-G., Jeon, H.S., Lee, S.-M., Lee, Y., Kim, J.: Exploring effective zero trust architecture for defense cybersecurity: A study. KSII Transactions on Internet and Information Systems (TIIS) 18(9), 2665\u20132691 (2024). https:\/\/doi.org\/10.3837\/tiis.2024.09.011","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"9998_CR29","doi-asserted-by":"publisher","first-page":"119868","DOI":"10.1109\/ACCESS.2024.3449702","volume":"12","author":"F Alsulami","year":"2024","unstructured":"Alsulami, F., Kulkarni, A.R., Hazari, N.A., Niamat, M.Y.: Zebra: Zero trust architecture employing blockchain technology and ropuf for ami security. IEEE Access 12, 119868\u2013119883 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3449702","journal-title":"IEEE Access"},{"key":"9998_CR30","doi-asserted-by":"publisher","unstructured":"Alshehri, A., Tunc, C.: Zero trust engine for iot environments. 2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA), 1\u20133 (2023). https:\/\/doi.org\/10.1109\/AICCSA59173.2023.10479286","DOI":"10.1109\/AICCSA59173.2023.10479286"},{"issue":"13","key":"9998_CR31","doi-asserted-by":"publisher","first-page":"23683","DOI":"10.1109\/JIOT.2024.3385989","volume":"11","author":"W Jing","year":"2024","unstructured":"Jing, W., Peng, L., Fu, H., Hu, A.: An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks. IEEE Internet Things J. 11(13), 23683\u201323698 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3385989","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"9998_CR32","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.3837\/tiis.2023.09.012","volume":"17","author":"C-J Chew","year":"2023","unstructured":"Chew, C.-J., Wang, P.-Y., Lee, J.-S.: Behavioral analysis zero-trust architecture relying on adaptive multifactor and threat determination. KSII Transactions on Internet and Information Systems (TIIS) 17(9), 2529\u20132549 (2023). https:\/\/doi.org\/10.3837\/tiis.2023.09.012","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"9998_CR33","doi-asserted-by":"publisher","unstructured":"Pokhrel, S.R., Yang, L., Rajasegarar, S., Li, G.: Robust zero trust architecture: Joint blockchain based federated learning and anomaly detection based framework. Proceedings of the SIGCOMM Workshop on Zero Trust Architecture for Next Generation Communications. ZTA-NextGen \u201924, 7\u201312. Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3672200.3673878","DOI":"10.1145\/3672200.3673878"},{"key":"9998_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103261","volume":"155","author":"S Hasan","year":"2024","unstructured":"Hasan, S., Amundson, I., Hardin, D.: Zero-trust design and assurance patterns for cyber-physical systems. J. Syst. Architect. 155, 103261 (2024). https:\/\/doi.org\/10.1016\/j.sysarc.2024.103261","journal-title":"J. Syst. Architect."},{"key":"9998_CR35","doi-asserted-by":"publisher","unstructured":"Kang, H., Liu, G., Wang, Q., Meng, L., Liu, J.: Theory and application of zero trust security: A brief survey. Entropy 25(12) (2023) https:\/\/doi.org\/10.3390\/e25121595","DOI":"10.3390\/e25121595"},{"issue":"4","key":"9998_CR36","doi-asserted-by":"publisher","first-page":"4240","DOI":"10.1002\/ett.4240","volume":"32","author":"S Hajj","year":"2021","unstructured":"Hajj, S., El Sibai, R., Bou Abdo, J., Demerjian, J., Makhoul, A., Guyeux, C.: Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. Transactions on Emerging Telecommunications Technologies 32(4), 4240 (2021). https:\/\/doi.org\/10.1002\/ett.4240","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"9998_CR37","doi-asserted-by":"crossref","unstructured":"Chandre, P., Mahalle, P., Shinde, G.: Intrusion prevention system using convolutional neural network for wireless sensor network. IAES International Journal of Artificial Intelligence (IJ-AI) 11, 504 (2022) https:\/\/doi.org\/10.11591\/ijai.v11.i2.pp504-515","DOI":"10.11591\/ijai.v11.i2.pp504-515"},{"key":"9998_CR38","doi-asserted-by":"publisher","unstructured":"Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z., Zhipeng, Z.: Securing a network: How effective using firewalls and vpns are? Proceedings of the Future Information and Communication Conference (FICC), vol. 2. San Francisco, CA, USA, 1050\u20131068 (2019). https:\/\/doi.org\/10.1007\/978-3-030-12385-7_71","DOI":"10.1007\/978-3-030-12385-7_71"},{"key":"9998_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102911","volume":"122","author":"Z Adahman","year":"2022","unstructured":"Adahman, Z., Malik, A.W., Anwar, Z.: An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security 122, 102911 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102911","journal-title":"Computers & Security"},{"key":"9998_CR40","doi-asserted-by":"publisher","unstructured":"Seh, A.H., Zarour, M., Alenezi, M., Sarkar, A.K., Agrawal, A., Kumar, R., Ahmad\u00a0Khan, R.: Healthcare data breaches: Insights and implications. Healthcare 8(2) (2020) https:\/\/doi.org\/10.3390\/healthcare8020133","DOI":"10.3390\/healthcare8020133"},{"issue":"2","key":"9998_CR41","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/JSYST.2015.2487221","volume":"11","author":"A Sallam","year":"2017","unstructured":"Sallam, A., Bertino, E., Hussain, S.R., Landers, D., Lefler, R.M., Steiner, D.: Dbsafe$$-$$an anomaly detection system to protect databases from exfiltration attempts. IEEE Syst. J. 11(2), 483\u2013493 (2017). https:\/\/doi.org\/10.1109\/JSYST.2015.2487221","journal-title":"IEEE Syst. J."},{"key":"9998_CR42","unstructured":"Storchak, Y.: Insider threat statistics for 2024: Reports, facts, actors, and costs origin. https:\/\/tinyurl.com\/22nn2z5j (2024)"},{"key":"9998_CR43","doi-asserted-by":"publisher","unstructured":"Liu, Q., Stokes, J.W., Mead, R., Burrell, T., Hellen, I., Lambert, J., Marochko, A., Cui, W.: Latte: Large-scale lateral movement detection. MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), 1\u20136 (2018). https:\/\/doi.org\/10.1109\/MILCOM.2018.8599748","DOI":"10.1109\/MILCOM.2018.8599748"},{"key":"9998_CR44","doi-asserted-by":"publisher","unstructured":"Purvine, E., Johnson, J.R., Lo, C.: A graph-based impact metric for mitigating lateral movement cyber attacks. Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense. SafeConfig \u201916, 45\u201352. Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2994475.2994476","DOI":"10.1145\/2994475.2994476"},{"key":"9998_CR45","doi-asserted-by":"publisher","unstructured":"Fawaz, A., Bohara, A., Cheh, C., Sanders, W.H.: Lateral movement detection using distributed data fusion. 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 21\u201330 (2016). https:\/\/doi.org\/10.1109\/SRDS.2016.014","DOI":"10.1109\/SRDS.2016.014"},{"key":"9998_CR46","doi-asserted-by":"publisher","unstructured":"Yao, Q., Wang, Q., Zhang, X., Fei, J.: Dynamic access control and authorization system based on zero-trust architecture. Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System. CCRIS \u201920, 123\u2013127. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3437802.3437824","DOI":"10.1145\/3437802.3437824"},{"key":"9998_CR47","unstructured":"Defense\u00a0Cybersecurity, D., Agency, I.S.: Embracing a Zero Trust Security Model (2021). https:\/\/media.defense.gov\/2021\/Feb\/25\/2002588479\/-1\/-1\/0\/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF"},{"key":"9998_CR48","unstructured":"John, K.: No More Chewy Centers: Introducing the Zero Trust Model of Information Security (2010). https:\/\/media.paloaltonetworks.com\/documents\/Forrester-No-More-Chewy-Centers.pdf"},{"key":"9998_CR49","unstructured":"Joseph, D., Mark, S., Jakub, S.: Back to the Future: What the Jericho Forum Taught Us About Modern Security (2020). https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/28\/back-to-the-future-what-the-jericho-forum-taught-us-about-modern-security\/?msockid=1aecedc80d8063942bebf9810c89624b"},{"issue":"5","key":"9998_CR50","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1177\/03063127231221107","volume":"54","author":"M Spencer","year":"2024","unstructured":"Spencer, M., Pizio, D.: The de-perimeterisation of information security: The jericho forum, zero trust, and narrativity. Soc. Stud. Sci. 54(5), 655\u2013677 (2024). https:\/\/doi.org\/10.1177\/03063127231221107","journal-title":"Soc. Stud. Sci."},{"key":"9998_CR51","doi-asserted-by":"publisher","unstructured":"Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: Enforcing privacy using symmetric random key-set in vehicular networks. Eighth International Symposium on Autonomous Decentralized Systems (ISADS\u201907), 344\u2013351 (2007). https:\/\/doi.org\/10.1109\/ISADS.2007.37","DOI":"10.1109\/ISADS.2007.37"},{"issue":"10","key":"9998_CR52","doi-asserted-by":"publisher","first-page":"3333","DOI":"10.1108\/BIJ-07-2021-0421","volume":"29","author":"P Arunprasad","year":"2022","unstructured":"Arunprasad, P., Dey, C., Jebli, F., Manimuthu, A., El Hathat, Z.: Exploring the remote work challenges in the era of covid-19 pandemic: review and application model. Benchmarking: An International Journal 29(10), 3333\u20133355 (2022). https:\/\/doi.org\/10.1108\/BIJ-07-2021-0421","journal-title":"Benchmarking: An International Journal"},{"key":"9998_CR53","unstructured":"Haider, A.: COVID-19 driving surge in enterprise cloud adoption $$-$$ 451 survey (2021). https:\/\/www.spglobal.com\/marketintelligence\/en\/news-insights\/latest-news-headlines\/covid-19-driving-surge-in-enterprise-cloud-adoption-8211-451-survey-63869853"},{"key":"9998_CR54","unstructured":"Aggarwal, G.: How the Pandemic Has Accelerated Cloud Adoption (2021). https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2021\/01\/15\/how-the-pandemic-has-accelerated-cloud-adoption\/"},{"key":"9998_CR55","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/informatics9010016","volume":"9","author":"K Downer","year":"2022","unstructured":"Downer, K., Bhattacharya, M.: Byod security: A study of human dimensions. Informatics 9, 16 (2022). https:\/\/doi.org\/10.3390\/informatics9010016","journal-title":"Informatics"},{"issue":"2","key":"9998_CR56","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1002\/itl2.247","volume":"4","author":"B Pranggono","year":"2021","unstructured":"Pranggono, B., Arabo, A.: Covid-19 pandemic cybersecurity issues. Internet Technology Letters 4(2), 247 (2021). https:\/\/doi.org\/10.1002\/itl2.247","journal-title":"Internet Technology Letters"},{"key":"9998_CR57","unstructured":"The White House: Executive Order on Improving the Nation\u2019s Cybersecurity (2021). https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/"},{"key":"9998_CR58","unstructured":"Cybersecurity and Infrastructure Security Agency (CISA): Executive Order on Improving the Nation\u2019s Cybersecurity (2021). https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/executive-order-improving-nations-cybersecurity"},{"key":"9998_CR59","doi-asserted-by":"publisher","unstructured":"Scott Rose and Oliver Borchert and Sahan G. Mitchell and Sean Connelly: Zero trust architecture. Technical Report SP 800-207, National Institute of Standards and Technology (NIST) (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-207","DOI":"10.6028\/NIST.SP.800-207"},{"key":"9998_CR60","doi-asserted-by":"publisher","first-page":"134285","DOI":"10.1109\/ACCESS.2024.3455753","volume":"12","author":"A Naseer","year":"2024","unstructured":"Naseer, A., Tamoor, M., Allheeib, N., Kanwal, S.: Investigating the taxonomy of character recognition systems: A systematic literature review. IEEE Access 12, 134285\u2013134303 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3455753","journal-title":"IEEE Access"},{"issue":"5","key":"9998_CR61","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.ijsu.2010.02.007","volume":"8","author":"D Moher","year":"2010","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting items for systematic reviews and meta-analyses: The prisma statement. Int. J. Surg. 8(5), 336\u2013341 (2010). https:\/\/doi.org\/10.1016\/j.ijsu.2010.02.007","journal-title":"Int. J. Surg."},{"key":"9998_CR62","doi-asserted-by":"publisher","first-page":"136330","DOI":"10.1109\/ACCESS.2024.3427714","volume":"12","author":"N Esmaail","year":"2024","unstructured":"Esmaail, N., Omar, N., Mohd, M., Fauzi, F., Mansur, Z.: Named entity recognition in user-generated text: A systematic literature review. IEEE Access 12, 136330\u2013136353 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3427714","journal-title":"IEEE Access"},{"key":"9998_CR63","doi-asserted-by":"publisher","first-page":"32927","DOI":"10.1109\/ACCESS.2025.3540034","volume":"13","author":"MSLS Tomaz","year":"2025","unstructured":"Tomaz, M.S.L.S., Fernandes, B.J.T., Sciutti, A.: Identification of anomalous behavior through the observation of an individual\u2019s emotional variation: A systematic review. IEEE Access 13, 32927\u201332943 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3540034","journal-title":"IEEE Access"},{"key":"9998_CR64","doi-asserted-by":"publisher","first-page":"149399","DOI":"10.1109\/ACCESS.2024.3477465","volume":"12","author":"FH Firmansyah","year":"2024","unstructured":"Firmansyah, F.H., Rosmansyah, Y.: Exploring collaboration in multiplayer gamification: A systematic literature review. IEEE Access 12, 149399\u2013149431 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3477465","journal-title":"IEEE Access"},{"key":"9998_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102116","volume":"101","author":"F Binbeshr","year":"2021","unstructured":"Binbeshr, F., Mat Kiah, M.L., Por, L.Y., Zaidan, A.A.: A systematic review of pin-entry methods resistant to shoulder-surfing attacks. Computers & Security 101, 102116 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102116","journal-title":"Computers & Security"},{"key":"9998_CR66","doi-asserted-by":"publisher","first-page":"92386","DOI":"10.1109\/ACCESS.2024.3423338","volume":"12","author":"S Pooja","year":"2024","unstructured":"Pooja, S., Chandrakala, C.B.: Secure reviewing and data sharing in scientific collaboration: Leveraging blockchain and zero trust architecture. IEEE Access 12, 92386\u201392399 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3423338","journal-title":"IEEE Access"},{"key":"9998_CR67","doi-asserted-by":"publisher","first-page":"89322","DOI":"10.1109\/ACCESS.2024.3418572","volume":"12","author":"A Kulkarni","year":"2024","unstructured":"Kulkarni, A., Hazari, N.A., Niamat, M.Y.: A zero trust-based framework employing blockchain technology and ring oscillator physical unclonable functions for security of field programmable gate array supply chain. IEEE Access 12, 89322\u201389338 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3418572","journal-title":"IEEE Access"},{"key":"9998_CR68","doi-asserted-by":"publisher","first-page":"92337","DOI":"10.1109\/ACCESS.2024.3423400","volume":"12","author":"I Ud Din","year":"2024","unstructured":"Ud Din, I., Habib Khan, K., Almogren, A., Zareei, M., Arturo P\u00e9rez D\u00edaz, J.: Securing the metaverse: A blockchain-enabled zero-trust architecture for virtual environments. IEEE Access 12, 92337\u201392347 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3423400","journal-title":"IEEE Access"},{"key":"9998_CR69","doi-asserted-by":"publisher","first-page":"129611","DOI":"10.1109\/ACCESS.2024.3413696","volume":"12","author":"T Sasada","year":"2024","unstructured":"Sasada, T., Taenaka, Y., Kadobayashi, Y., Fall, D.: Web-biometrics for user authenticity verification in zero trust access control. IEEE Access 12, 129611\u2013129622 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3413696","journal-title":"IEEE Access"},{"key":"9998_CR70","doi-asserted-by":"publisher","first-page":"154066","DOI":"10.1109\/ACCESS.2024.3484522","volume":"12","author":"S Son","year":"2024","unstructured":"Son, S., Kwon, D., Lee, S., Kwon, H., Park, Y.: A zero-trust authentication scheme with access control for 6g-enabled iot environments. IEEE Access 12, 154066\u2013154079 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3484522","journal-title":"IEEE Access"},{"key":"9998_CR71","doi-asserted-by":"publisher","first-page":"72420","DOI":"10.1109\/ACCESS.2024.3402341","volume":"12","author":"B Zyoud","year":"2024","unstructured":"Zyoud, B., Lebai Lutfi, S.: The role of information security culture in zero trust adoption: Insights from uae organizations. IEEE Access 12, 72420\u201372444 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3402341","journal-title":"IEEE Access"},{"key":"9998_CR72","doi-asserted-by":"publisher","first-page":"176033","DOI":"10.1109\/ACCESS.2024.3503587","volume":"12","author":"AA Alquwayzani","year":"2024","unstructured":"Alquwayzani, A.A., Albuali, A.A.: A systematic literature review of zero trust architecture for military uav security systems. IEEE Access 12, 176033\u2013176056 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3503587","journal-title":"IEEE Access"},{"key":"9998_CR73","doi-asserted-by":"publisher","first-page":"99201","DOI":"10.1109\/ACCESS.2024.3429197","volume":"12","author":"I Dhanapala","year":"2024","unstructured":"Dhanapala, I., Bharti, S., McGibney, A., Rea, S.: Toward a performance-based trustworthy edge-cloud continuum. IEEE Access 12, 99201\u201399212 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3429197","journal-title":"IEEE Access"},{"key":"9998_CR74","doi-asserted-by":"publisher","unstructured":"Song, R., Wu, J., Pan, Q., Imran, M., Naser, N., Jones, R., Verikoukis, C.: Zero-trust empowered decentralized security defense against poisoning attacks in sl-iot: Joint distance-accuracy detection approach. GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2766\u20132771 (2023). https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437789","DOI":"10.1109\/GLOBECOM54140.2023.10437789"},{"key":"9998_CR75","doi-asserted-by":"publisher","unstructured":"Ridhawi, I.A., Aloqaily, M.: Zero-trust uav-enabled and dt-supported 6g networks. GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 6171\u20136176 (2023). https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437186","DOI":"10.1109\/GLOBECOM54140.2023.10437186"},{"key":"9998_CR76","doi-asserted-by":"publisher","unstructured":"Moudoud, H., Cherkaoui, S.: Enhancing open ran security with zero trust and machine learning. In: GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 2772\u20132777 (2023). https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437043","DOI":"10.1109\/GLOBECOM54140.2023.10437043"},{"key":"9998_CR77","doi-asserted-by":"publisher","unstructured":"Moudoud, H., Hamhoum, W., Cherkaoui, S.: Strengthening open radio access networks: Advancing safeguards through zta and deep learning. GLOBECOM 2023 - 2023 IEEE Global Communications Conference, 80\u201385 (2023). https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437829","DOI":"10.1109\/GLOBECOM54140.2023.10437829"},{"key":"9998_CR78","doi-asserted-by":"publisher","unstructured":"Fu, P., Wu, J., Lin, X., Shen, A.: Ztei: Zero-trust and edge intelligence empowered continuous authentication for satellite networks. GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2376\u20132381 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000958","DOI":"10.1109\/GLOBECOM48099.2022.10000958"},{"key":"9998_CR79","doi-asserted-by":"publisher","unstructured":"Daah, C., Qureshi, A., Awan, I., Konur, S.: Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework. Electronics 13(5) (2024) https:\/\/doi.org\/10.3390\/electronics13050865","DOI":"10.3390\/electronics13050865"},{"key":"9998_CR80","doi-asserted-by":"publisher","unstructured":"Han, C., Kim, T., Lee, W., Shin, Y.: S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud. Electronics 13(16) (2024) https:\/\/doi.org\/10.3390\/electronics13163213","DOI":"10.3390\/electronics13163213"},{"key":"9998_CR81","doi-asserted-by":"publisher","unstructured":"Wang, J., Wang, Z., Song, J., Cheng, H.: Attribute and user trust score-based zero trust access control model in iov. Electronics 12(23) (2023) https:\/\/doi.org\/10.3390\/electronics12234825","DOI":"10.3390\/electronics12234825"},{"key":"9998_CR82","doi-asserted-by":"publisher","unstructured":"Federici, F., Martintoni, D., Senni, V.: A zero-trust architecture for remote access in industrial iot infrastructures. Electronics 12(3) (2023) https:\/\/doi.org\/10.3390\/electronics12030566","DOI":"10.3390\/electronics12030566"},{"key":"9998_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103523","volume":"161","author":"F Nawshin","year":"2024","unstructured":"Nawshin, F., Unal, D., Hammoudeh, M., Suganthan, P.N.: Ai-powered malware detection with differential privacy for zero trust security in internet of things networks. Ad Hoc Netw. 161, 103523 (2024). https:\/\/doi.org\/10.1016\/j.adhoc.2024.103523","journal-title":"Ad Hoc Netw."},{"key":"9998_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103161","volume":"145","author":"W Huang","year":"2023","unstructured":"Huang, W., Xie, X., Wang, Z., Feng, J., Han, G., Zhang, W.: Zt-access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power iot environments. Ad Hoc Netw. 145, 103161 (2023). https:\/\/doi.org\/10.1016\/j.adhoc.2023.103161","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"9998_CR85","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MWC.001.2300420","volume":"31","author":"A Elmaghbub","year":"2024","unstructured":"Elmaghbub, A., Hamdaoui, B.: Domain-agnostic hardware fingerprinting-based device identifier for zero-trust iot security. IEEE Wirel. Commun. 31(2), 42\u201348 (2024). https:\/\/doi.org\/10.1109\/MWC.001.2300420","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"9998_CR86","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MWC.015.2300418","volume":"31","author":"M Jamil","year":"2024","unstructured":"Jamil, M., Farhan, M., Ullah, F., Srivastava, G.: A lightweight zero trust framework for secure 5g vanet vehicular communication. IEEE Wirel. Commun. 31(6), 136\u2013141 (2024). https:\/\/doi.org\/10.1109\/MWC.015.2300418","journal-title":"IEEE Wirel. Commun."},{"key":"9998_CR87","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110197","volume":"241","author":"B Ali","year":"2024","unstructured":"Ali, B., Gregory, M.A., Li, S., Dib, O.A.: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing. Comput. Netw. 241, 110197 (2024). https:\/\/doi.org\/10.1016\/j.comnet.2024.110197","journal-title":"Comput. Netw."},{"key":"9998_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109358","volume":"217","author":"K Ramezanpour","year":"2022","unstructured":"Ramezanpour, K., Jagannath, J.: Intelligent zero trust architecture for 5G\/6G networks: principles, challenges, and the role of machine learning in the context of o-ran. Comput. Netw. 217, 109358 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109358","journal-title":"Comput. Netw."},{"key":"9998_CR89","doi-asserted-by":"publisher","unstructured":"Han, J., Li, Q., Xu, Y., Zhu, Y., Wu, B.: Design of a trusted content authorization security framework for social media. Appl. Sci. (2024) https:\/\/doi.org\/10.3390\/app14041643","DOI":"10.3390\/app14041643"},{"key":"9998_CR90","doi-asserted-by":"publisher","unstructured":"Tyler, D., Viana, T.: Trust no one? a framework for assisting healthcare organisations in transitioning to a zero-trust network architecture. Appl. Sci. (2021) https:\/\/doi.org\/10.3390\/app11167499","DOI":"10.3390\/app11167499"},{"key":"9998_CR91","doi-asserted-by":"publisher","unstructured":"Manan, A., Min, Z., Mahmoudi, C., Formicola, V.: Extending 5G services with zero trust security pillars: a modular approach. In: 2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/AICCSA56895.2022.10017774","DOI":"10.1109\/AICCSA56895.2022.10017774"},{"issue":"1","key":"9998_CR92","doi-asserted-by":"publisher","first-page":"6367579","DOI":"10.1155\/2022\/6367579","volume":"2022","author":"S Alshomrani","year":"2022","unstructured":"Alshomrani, S., Li, S.: PUFDCA: a zero-trust-based iot device continuous authentication protocol. Wirel. Commun. Mob. Comput. 2022(1), 6367579 (2022). https:\/\/doi.org\/10.1155\/2022\/6367579","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"9998_CR93","doi-asserted-by":"publisher","unstructured":"Wang, Z., Yu, X., Xue, P., Qu, Y., Ju, L.: Research on medical security system based on zero trust. Sensors (2023) https:\/\/doi.org\/10.3390\/s23073774","DOI":"10.3390\/s23073774"},{"key":"9998_CR94","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1186\/s12911-020-01275-y","volume":"20","author":"M Sultana","year":"2020","unstructured":"Sultana, M., Hossain, A., Laila, F., et al.: Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med. Inform. Decis. Mak. 20, 256 (2020). https:\/\/doi.org\/10.1186\/s12911-020-01275-y","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"9998_CR95","unstructured":"HIPAA Journal: HC3 lessons learned from the ransomware attack on Ireland\u2019s Health Service Executive (2023). https:\/\/www.hipaajournal.com\/hc3-lessons-learned-from-the-ransomware-attack-on-irelands-health-service-executive\/"},{"key":"9998_CR96","unstructured":"HIPAA Journal: NationsBenefits Holdings Confirms 3 Million Record Data Breach (2023). https:\/\/www.hipaajournal.com\/nationsbenefits-holdings-confirms-3-million-record-data-breach\/"},{"key":"9998_CR97","unstructured":"Tosif, B.: MediBank\u2019s cyber incident: one of Australia\u2019s Most Invasive Data Breach (2024). https:\/\/medium.com\/@BilalTosif\/medibanks-cyber-incident-one-of-australia-s-most-invasive-data-breach-a75c3bd54c2c"},{"key":"9998_CR98","doi-asserted-by":"publisher","unstructured":"Freitas, L.L.C., Coelho, K.K., Nogueira, M., Vieira, A.B., Nacif, J.A.M., Silva, E.F.: Context-sensitive access control and zero trust for security in e-health. In: 2024 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/ISCC61673.2024.10733673","DOI":"10.1109\/ISCC61673.2024.10733673"},{"issue":"2","key":"9998_CR99","doi-asserted-by":"publisher","first-page":"125","DOI":"10.18278\/jcip.2.2.7","volume":"2","author":"A Scalco","year":"2021","unstructured":"Scalco, A., Flanigan, D., Simske, S.: Control systems cyber security reference architecture (RA) for critical infrastructure: Healthcare and hospital vertical example. J. Crit. Infrastruct. Policy 2(2), 125\u2013145 (2021). https:\/\/doi.org\/10.18278\/jcip.2.2.7","journal-title":"J. Crit. Infrastruct. Policy"},{"key":"9998_CR100","doi-asserted-by":"publisher","unstructured":"Geetha, G., Chatterjee, A., Kumar, C.A.: A zero trust approach to securing 5g smart healthcare. In: 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), vol. 1, pp. 1\u20139 (2023). https:\/\/doi.org\/10.1109\/ICAIIHI57871.2023.10489485","DOI":"10.1109\/ICAIIHI57871.2023.10489485"},{"key":"9998_CR101","doi-asserted-by":"publisher","unstructured":"Samonte, M.J.C., Aparize, J.E.R., Geronimo, J.M., Ori\u00f1o, C.C.: Implementing zero trust security in microservice architecture of electronic health record. In: 2024 4th International Conference on Computer Systems (ICCS), pp. 98\u2013105 (2024). https:\/\/doi.org\/10.1109\/ICCS62594.2024.10795827","DOI":"10.1109\/ICCS62594.2024.10795827"},{"key":"9998_CR102","doi-asserted-by":"publisher","unstructured":"B\u00a0V, H., U, U., Mounika, P., Shamala, L.M.: Implementing otp verification and zero trust security for role-based access control in medical records. In: 2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/ICSTSN61422.2024.10671108","DOI":"10.1109\/ICSTSN61422.2024.10671108"},{"issue":"4","key":"9998_CR103","doi-asserted-by":"publisher","first-page":"4233","DOI":"10.1002\/ett.4233","volume":"32","author":"HHH Mahmoud","year":"2021","unstructured":"Mahmoud, H.H.H., Amer, A.A., Ismail, T.: 6g: a comprehensive survey on technologies, applications, challenges, and research problems. Trans. Emerg. Telecommun. Technol. 32(4), 4233 (2021). https:\/\/doi.org\/10.1002\/ett.4233","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"9998_CR104","doi-asserted-by":"publisher","first-page":"43134","DOI":"10.1109\/ACCESS.2021.3054833","volume":"9","author":"JR Bhat","year":"2021","unstructured":"Bhat, J.R., Alqahtani, S.A.: 6G ecosystem: current status and future perspective. IEEE Access 9, 43134\u201343167 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3054833","journal-title":"IEEE Access"},{"key":"9998_CR105","doi-asserted-by":"publisher","unstructured":"Sinha, G., Agarwal, A.: Dynamic trust management and ai-based multi-factor authentication for 6g machine type communications. In: 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), pp. 560\u2013565 (2025). https:\/\/doi.org\/10.1109\/CE2CT64011.2025.10939377","DOI":"10.1109\/CE2CT64011.2025.10939377"},{"key":"9998_CR106","doi-asserted-by":"publisher","unstructured":"Ramezanpour, K., Jagannath, J.: Intelligent zero trust architecture for 5G\/6G networks: principles, challenges, and the role of machine learning in the context of o-ran. Comput. Netw. (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109358","DOI":"10.1016\/j.comnet.2022.109358"},{"issue":"4","key":"9998_CR107","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/MNET.2023.3326356","volume":"38","author":"X Chen","year":"2024","unstructured":"Chen, X., Feng, W., Ge, N., Zhang, Y.: Zero trust architecture for 6G security. IEEE Netw. 38(4), 224\u2013232 (2024). https:\/\/doi.org\/10.1109\/MNET.2023.3326356","journal-title":"IEEE Netw."},{"key":"9998_CR108","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109246","volume":"216","author":"P Tedeschi","year":"2022","unstructured":"Tedeschi, P., Sciancalepore, S., Di Pietro, R.: Satellite-based communications security: a survey of threats, solutions, and research challenges. Comput. Netw. 216, 109246 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109246","journal-title":"Comput. Netw."},{"key":"9998_CR109","doi-asserted-by":"publisher","unstructured":"Pokhrel, S.R.: Poster: Orbital zta! secure satellite communication networks with zero trust architecture. In: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos. ACM SIGCOMM Posters and Demos \u201924, pp. 33\u201335. Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3672202.3673727","DOI":"10.1145\/3672202.3673727"},{"issue":"1","key":"9998_CR110","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1047\/1\/012117","volume":"1047","author":"EA Lavrov","year":"2021","unstructured":"Lavrov, E.A., Zolkin, A.L., Aygumov, T.G., Chistyakov, M.S., Akhmetov, I.V.: Analysis of information security issues in corporate computer networks. IOP Conf. Ser. Mater. Sci. Eng. 1047(1), 012117 (2021). https:\/\/doi.org\/10.1088\/1757-899X\/1047\/1\/012117","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"9998_CR111","doi-asserted-by":"publisher","unstructured":"Aslan, O., Aktug, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics (2023) https:\/\/doi.org\/10.3390\/electronics12061333","DOI":"10.3390\/electronics12061333"},{"key":"9998_CR112","doi-asserted-by":"publisher","unstructured":"Tolkachov, M., Dzheniuk, N., Yevseiev, S., Lysetskyi, Y., Shulha, V., Grod, I., Faraon, S., Ivanchenko, I., Pasko, I., Balagura, D.: Development of a method for protecting information resources in a corporate network by segmenting traffic. East. Eur. J. Enterp. Technol. (2024). https:\/\/doi.org\/10.15587\/1729-4061.2024.313158","DOI":"10.15587\/1729-4061.2024.313158"},{"key":"9998_CR113","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.1109\/OJCOMS.2024.3391728","volume":"5","author":"J Jose Diaz\u00a0Rivera","year":"2024","unstructured":"Jose Diaz\u00a0Rivera, J., Muhammad, A., Song, W.-C.: Securing digital identity in the zero trust architecture: a blockchain approach to privacy-focused multi-factor authentication. IEEE Open J. Commun. Soc. 5, 2792\u20132814 (2024). https:\/\/doi.org\/10.1109\/OJCOMS.2024.3391728","journal-title":"IEEE Open J. Commun. Soc."},{"key":"9998_CR114","doi-asserted-by":"publisher","unstructured":"El\u00a0Houda, Z.A., Moudoud, H., Khoukhi, L.: Blockchain meets O-RAN: a decentralized zero-trust framework for secure and resilient O-RAN in 6G and beyond. In: IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS61880.2024.10620803","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620803"},{"key":"9998_CR115","doi-asserted-by":"publisher","unstructured":"Hamhoum, W., Lakhdar, H., Cherkaoui, S.: Fortifying open ran security with zero trust architecture and transformers. In: ICC 2024 - IEEE International Conference on Communications, pp. 2216\u20132221 (2024). https:\/\/doi.org\/10.1109\/ICC51166.2024.10622553","DOI":"10.1109\/ICC51166.2024.10622553"},{"key":"9998_CR116","doi-asserted-by":"publisher","DOI":"10.1016\/j.irfa.2022.102103","volume":"81","author":"V Murinde","year":"2022","unstructured":"Murinde, V., Rizopoulos, E., Zachariadis, M.: The impact of the fintech revolution on the future of banking: opportunities and risks. Int. Rev. Financ. Anal. 81, 102103 (2022). https:\/\/doi.org\/10.1016\/j.irfa.2022.102103","journal-title":"Int. Rev. Financ. Anal."},{"key":"9998_CR117","unstructured":"Fortinet: MOVEit Transfer Critical Vulnerability (CVE-2023-34362) Exploited as a 0-Day (2023). https:\/\/www.fortinet.com\/blog\/threat-research\/moveit-transfer-critical-vulnerability-cve-2023-34362-exploited-as-a-0-day"},{"key":"9998_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2024.103027","volume":"138","author":"C Daah","year":"2025","unstructured":"Daah, C., Qureshi, A., Awan, I., Konur, S.: Simulation-based evaluation of advanced threat detection and response in financial industry networks using zero trust and blockchain technology. Simul. Model. Pract. Theory 138, 103027 (2025). https:\/\/doi.org\/10.1016\/j.simpat.2024.103027","journal-title":"Simul. Model. Pract. Theory"},{"key":"9998_CR119","doi-asserted-by":"publisher","unstructured":"Daah, C., Qureshi, A., Awan, I.: Zero trust model implementation considerations in financial institutions: a proposed framework. In: 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 71\u201377 (2023). https:\/\/doi.org\/10.1109\/FiCloud58648.2023.00019","DOI":"10.1109\/FiCloud58648.2023.00019"},{"key":"9998_CR120","doi-asserted-by":"publisher","unstructured":"Wei, Y.C., Yu, T.W.: Zero trust framework in financial sector: The handling of machine learning based trust management. In: 2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), \u2032pp. 211\u2013212 (2023). https:\/\/doi.org\/10.1109\/ICCE-Taiwan58799.2023.10226959","DOI":"10.1109\/ICCE-Taiwan58799.2023.10226959"},{"issue":"2","key":"9998_CR121","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1049\/blc2.12028","volume":"3","author":"UB Chaudhry","year":"2023","unstructured":"Chaudhry, U.B., Hydros, A.K.: Zero-trust-based security model against data breaches in the banking sector: a blockchain consensus algorithm. IET Blockchain 3(2), 98\u2013115 (2023). https:\/\/doi.org\/10.1049\/blc2.12028","journal-title":"IET Blockchain"},{"issue":"1","key":"9998_CR122","doi-asserted-by":"publisher","first-page":"191","DOI":"10.31341\/jios.48.1.11","volume":"48","author":"A Singh","year":"2024","unstructured":"Singh, A., Pareek, V., Sharma, A.: A review on blockchain for fintech using zero trust architecture. J. Inf. Organ. Sci. 48(1), 191\u2013213 (2024). https:\/\/doi.org\/10.31341\/jios.48.1.11","journal-title":"J. Inf. Organ. Sci."},{"key":"9998_CR123","doi-asserted-by":"publisher","unstructured":"Bast, C., Yeh, K.-H.: Emerging authentication technologies for zero trust on the internet of things. Symmetry (2024). https:\/\/doi.org\/10.3390\/sym16080993","DOI":"10.3390\/sym16080993"},{"key":"9998_CR124","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436","volume":"110","author":"C Buck","year":"2021","unstructured":"Buck, C., Olenberger, C., Schweizer, A., Volter, F., Eymann, T.: Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 110, 102436 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102436","journal-title":"Comput. Secur."},{"key":"9998_CR125","doi-asserted-by":"publisher","unstructured":"Xiaojian, Z., Liandong, C., Jie, F., Xiangqun, W., Qi, W.: Power iot security protection architecture based on zero trust framework. In: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), pp. 166\u2013170 (2021). https:\/\/doi.org\/10.1109\/CSP51677.2021.9357607","DOI":"10.1109\/CSP51677.2021.9357607"},{"key":"9998_CR126","doi-asserted-by":"publisher","unstructured":"Nie, Y.: Analysis and research on secure access control technology of industrial internet of things based on ZTM model. J. Cyber Secur. Mob. (2024) https:\/\/doi.org\/10.13052\/jcsm2245-1439.1341","DOI":"10.13052\/jcsm2245-1439.1341"},{"key":"9998_CR127","doi-asserted-by":"publisher","unstructured":"Dimitrakos, T., Dilshener, T., Kravtsov, A., La\u00a0Marra, A., Martinelli, F., Rizos, A., Rosetti, A., Saracino, A.: Trust aware continuous authorization for zero trust in consumer internet of things. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1801\u20131812 (2020). https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00247","DOI":"10.1109\/TrustCom50675.2020.00247"},{"key":"9998_CR128","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.08.003","volume":"162","author":"JMB Murcia","year":"2025","unstructured":"Murcia, J.M.B., C\u00e1novas, E., Garc\u00eda-Rodr\u00edguez, J., Zarca, A.M., Skarmeta, A.: Decentralised identity management solution for zero-trust multi-domain computing continuum frameworks. Futur. Gener. Comput. Syst. 162, 107479 (2025). https:\/\/doi.org\/10.1016\/j.future.2024.08.003","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9998_CR129","doi-asserted-by":"publisher","unstructured":"Pokojski, Z., Kister, A., Lipowski, M.: Remote work efficiency from the employers\u2019 perspective\u2014what\u2019s next? Sustainability (2022) https:\/\/doi.org\/10.3390\/su14074220","DOI":"10.3390\/su14074220"},{"issue":"21","key":"9998_CR130","doi-asserted-by":"publisher","first-page":"2582","DOI":"10.1080\/09585192.2016.1232294","volume":"27","author":"P Peters","year":"2016","unstructured":"Peters, P., Ligthart, P.E., Bardoel, A., Poutsma, E.: \u2018fit\u2019for telework\u2019? cross-cultural variance and task-control explanations in organizations\u2019 formal telework practices. Int. J. Hum. Resour. Manag. 27(21), 2582\u20132603 (2016). https:\/\/doi.org\/10.1080\/09585192.2016.1232294","journal-title":"Int. J. Hum. Resour. Manag."},{"key":"9998_CR131","doi-asserted-by":"publisher","unstructured":"Tuyishime, E., Radu, F., Cotfas, P., Cotfas, D., Balan, T., Rekeraho, A.: Online laboratory access control with zero trust approach: In: Twingate use case. 2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20137 (2024). https:\/\/doi.org\/10.1109\/ECAI61503.2024.10607562","DOI":"10.1109\/ECAI61503.2024.10607562"},{"issue":"1","key":"9998_CR132","doi-asserted-by":"publisher","first-page":"149","DOI":"10.31341\/jios.48.1.8","volume":"48","author":"J Bartakke","year":"2024","unstructured":"Bartakke, J., Kashyap, R.: The usage of clouds in zero-trust security strategy: an evolving paradigm. J. Inf. Organ. Sci. 48(1), 149\u2013165 (2024). https:\/\/doi.org\/10.31341\/jios.48.1.8","journal-title":"J. Inf. Organ. Sci."},{"key":"9998_CR133","doi-asserted-by":"publisher","unstructured":"Rangappa, K., Ramaswamy, A.K.B., Prasad, M., Kumar, S.A.: A novel method of secured data distribution using sharding ZKP and zero trust architecture in blockchain multi cloud environment. Cryptography (2024). https:\/\/doi.org\/10.3390\/cryptography8030039","DOI":"10.3390\/cryptography8030039"},{"key":"9998_CR134","unstructured":"Shane, S.: Massive Okta Breach: What CISOs Should Know (2023). https:\/\/www.informationweek.com\/cyber-resilience\/massive-okta-breach-what-cisos-should-know"},{"key":"9998_CR135","doi-asserted-by":"publisher","unstructured":"Bicer, C., Murturi, I., Donta, P.K., Dustdar, S.: Blockchain-based zero trust on the edge. In: 2023 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 1006\u20131013 (2023). https:\/\/doi.org\/10.1109\/CSCI62032.2023.00167","DOI":"10.1109\/CSCI62032.2023.00167"},{"issue":"2","key":"9998_CR136","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/COMST.2023.3347172","volume":"26","author":"M Ali","year":"2024","unstructured":"Ali, M., Naeem, F., Kaddoum, G., Hossain, E.: Metaverse communications, networking, security, and applications: research issues, state-of-the-art, and future directions. IEEE Commun. Surv. Tutor. 26(2), 1238\u20131278 (2024). https:\/\/doi.org\/10.1109\/COMST.2023.3347172","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"9998_CR137","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MTS.2018.2826060","volume":"37","author":"B Falchuk","year":"2018","unstructured":"Falchuk, B., Loeb, S., Neff, R.: The social metaverse: battle for privacy. IEEE Technol. Soc. Mag. 37(2), 52\u201361 (2018). https:\/\/doi.org\/10.1109\/MTS.2018.2826060","journal-title":"IEEE Technol. Soc. Mag."},{"key":"9998_CR138","doi-asserted-by":"publisher","unstructured":"Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 747\u2013755 (2015). https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218444","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"9998_CR139","doi-asserted-by":"publisher","unstructured":"Al\u00a0Shehhi, F., Otoum, S.: On the feasibility of zero-trust architecture in assuring security in metaverse. In: 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA), pp. 1\u20138 (2023). https:\/\/doi.org\/10.1109\/iMETA59369.2023.10294740","DOI":"10.1109\/iMETA59369.2023.10294740"},{"issue":"2","key":"9998_CR140","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/MCOM.018.2300095","volume":"62","author":"R Cheng","year":"2024","unstructured":"Cheng, R., Chen, S., Han, B.: Toward zero-trust security for the metaverse. IEEE Commun. Mag. 62(2), 156\u2013162 (2024). https:\/\/doi.org\/10.1109\/MCOM.018.2300095","journal-title":"IEEE Commun. Mag."},{"key":"9998_CR141","doi-asserted-by":"publisher","unstructured":"Alshamsi, A., Adel, A., Ghfeli, M.A., Bouachir, O.: Metaguard: A zero-trust-based access control for metaverse. In: 2024 2nd International Conference on Intelligent Metaverse Technologies & Applications (iMETA), pp. 018\u2013019 (2024). https:\/\/doi.org\/10.1109\/iMETA62882.2024.10807921","DOI":"10.1109\/iMETA62882.2024.10807921"},{"key":"9998_CR142","unstructured":"Jonathan, G.: Applied Materials\u2019 Supply Chain Hit by Ransomware Attack Targeting MKS Instruments (2023). https:\/\/therecord.media\/applied-materials-supply-chain-mks-ransomware-attack"},{"issue":"11","key":"9998_CR143","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1080\/00207543.2021.1884311","volume":"59","author":"ZA Collier","year":"2021","unstructured":"Collier, Z.A., Sarkis, J.: The zero trust supply chain: managing supply chain risk in the absence of trust. Int. J. Prod. Res. 59(11), 3430\u20133445 (2021). https:\/\/doi.org\/10.1080\/00207543.2021.1884311","journal-title":"Int. J. Prod. Res."},{"key":"9998_CR144","unstructured":"C.\u00a0Todd, L.: DoD adopts zero trust approach to buying microelectronics (2020). https:\/\/www.defense.gov\/News\/News-Stories\/Article\/Article\/2192120\/dod-adopts-zero-trust-approach-to-buying-microelectronics\/"},{"key":"9998_CR145","doi-asserted-by":"publisher","unstructured":"Haque, E., Hasan, K., Ahmed, I., Alam, M.S., Islam, T.: Enhancing uav security through zero trust architecture: an advanced deep learning and explainable ai analysis. In: 2024 International Conference on Computing, Networking and Communications (ICNC), pp. 463\u2013467 (2024). https:\/\/doi.org\/10.1109\/ICNC59896.2024.10556279","DOI":"10.1109\/ICNC59896.2024.10556279"},{"key":"9998_CR146","doi-asserted-by":"publisher","unstructured":"Dong, C., Jiang, F., Chen, S., Liu, X.: Continuous authentication for uav delivery systems under zero-trust security framework. In: 2022 IEEE International Conference on Edge Computing and Communications (EDGE), pp. 123\u2013132 (2022). https:\/\/doi.org\/10.1109\/EDGE55608.2022.00027","DOI":"10.1109\/EDGE55608.2022.00027"},{"key":"9998_CR147","doi-asserted-by":"publisher","unstructured":"Dong, C., Pal, S., An, Q., Yao, A., Jiang, F., Xu, Z., Li, J., Lu, M., Song, Y., Chen, S., Liu, X.: Securing smart UAV delivery systems using zero trust principle-driven blockchain architecture. In: 2023 IEEE International Conference on Blockchain (Blockchain), pp. 315\u2013322 (2023). https:\/\/doi.org\/10.1109\/Blockchain60715.2023.00056","DOI":"10.1109\/Blockchain60715.2023.00056"},{"issue":"8","key":"9998_CR148","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","volume":"102","author":"U Guin","year":"2014","unstructured":"Guin, U., Huang, K., DiMase, D., Carulli, J.M., Tehranipoor, M., Makris, Y.: Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207\u20131228 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2332291","journal-title":"Proc. IEEE"},{"key":"9998_CR149","doi-asserted-by":"publisher","unstructured":"Rajendran, J., Vedula, V., Karri, R.: Detecting malicious modifications of data in third-party intellectual property cores. In: 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1145\/2744769.2744823","DOI":"10.1145\/2744769.2744823"},{"key":"9998_CR150","doi-asserted-by":"publisher","unstructured":"Kulkarni, A., Bhattarai, H., Syed, T.H., Niamat, M.: Protecting hardware ip by employing non-fungible tokens (NFTS). In: NAECON 2023 - IEEE National Aerospace and Electronics Conference, pp. 187\u2013191 (2023). https:\/\/doi.org\/10.1109\/NAECON58068.2023.10365737","DOI":"10.1109\/NAECON58068.2023.10365737"},{"key":"9998_CR151","doi-asserted-by":"publisher","first-page":"184013","DOI":"10.1109\/ACCESS.2020.3029339","volume":"8","author":"TD Perez","year":"2020","unstructured":"Perez, T.D., Pagliarini, S.: A survey on split manufacturing: attacks, defenses, and challenges. IEEE Access 8, 184013\u2013184035 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3029339","journal-title":"IEEE Access"},{"key":"9998_CR152","unstructured":"Mulazzani, F., Sarcia, S.A.: Cyber security on military deployed networks. In: 2011 3rd International Conference on Cyber Conflict, pp. 1\u201315 (2011). https:\/\/ieeexplore.ieee.org\/abstract\/document\/5954697"},{"key":"9998_CR153","doi-asserted-by":"publisher","unstructured":"Poirrier, A., Cailleux, L., Clausen, T.H.: An interoperable zero trust federated architecture for tactical systems. In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM), pp. 405\u2013410 (2023). https:\/\/doi.org\/10.1109\/MILCOM58377.2023.10356247","DOI":"10.1109\/MILCOM58377.2023.10356247"},{"issue":"3","key":"9998_CR154","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1177\/1548512915617252","volume":"13","author":"C Rani","year":"2016","unstructured":"Rani, C., Modares, H., Sriram, R., Mikulski, D., Lewis, F.L.: Security of unmanned aerial vehicle systems against cyber-physical attacks. J. Defense Model. Simul. 13(3), 331\u2013342 (2016). https:\/\/doi.org\/10.1177\/1548512915617252","journal-title":"J. Defense Model. Simul."},{"key":"9998_CR155","doi-asserted-by":"publisher","unstructured":"Nace, L.: Securing trajectory based operations through a zero trust framework in the NAS. In: 2020 Integrated Communications Navigation and Surveillance Conference (ICNS), pp. 1\u201311118 (2020). https:\/\/doi.org\/10.1109\/ICNS50378.2020.9222912","DOI":"10.1109\/ICNS50378.2020.9222912"},{"key":"9998_CR156","unstructured":"Center, M.N.: Hackers Hit Norsk Hydro With Ransomware\u2014how the company responded with transparency (2019). https:\/\/news.microsoft.com\/source\/features\/digital-transformation\/hackers-hit-norsk-hydro-ransomware-company-responded-transparency\/?msockid=1aecedc80d8063942bebf9810c89624b"},{"key":"9998_CR157","unstructured":"Wall, T.: Throwback attack: snake ransomware hits Honda Plants (2020). https:\/\/www.industrialcybersecuritypulse.com\/facilities\/throwback-attack-snake-ransomware-hits-honda-plants\/"},{"key":"9998_CR158","doi-asserted-by":"publisher","unstructured":"Wei, R., Li, G.: Ship platform access control method based on zero trust. In: 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), vol. 7, pp. 947\u2013952 (2024). https:\/\/doi.org\/10.1109\/ITNEC60942.2024.10733279","DOI":"10.1109\/ITNEC60942.2024.10733279"},{"key":"9998_CR159","doi-asserted-by":"publisher","unstructured":"Xu, Z., Di, B., Song, L.: Design of cloud-edge-gateway collaborative zero-trust architecture and workflow for smart factories. In: 2024 IEEE International Workshop on Radio Frequency and Antenna Technologies (iWRF &AT), pp. 335\u2013339 (2024). https:\/\/doi.org\/10.1109\/iWRFAT61200.2024.10594530","DOI":"10.1109\/iWRFAT61200.2024.10594530"},{"issue":"1","key":"9998_CR160","doi-asserted-by":"publisher","first-page":"6545323","DOI":"10.1155\/2023\/6545323","volume":"2023","author":"K Wu","year":"2023","unstructured":"Wu, K., Cheng, R., Xu, H., Tong, J.: Design and implementation of the zero trust model in the power Internet of Things. Int. Trans. Electr. Energy Syst. 2023(1), 6545323 (2023). https:\/\/doi.org\/10.1155\/2023\/6545323","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"9998_CR161","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.ijepes.2014.06.025","volume":"63","author":"R Rashed Mohassel","year":"2014","unstructured":"Rashed Mohassel, R., Fung, A., Mohammadi, F., Raahemifar, K.: A survey on advanced metering infrastructure. Int. J. Electr. Power Energy Syst. 63, 473\u2013484 (2014). https:\/\/doi.org\/10.1016\/j.ijepes.2014.06.025","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"9998_CR162","doi-asserted-by":"publisher","first-page":"214434","DOI":"10.1109\/ACCESS.2020.3041074","volume":"8","author":"S Acharya","year":"2020","unstructured":"Acharya, S., Dvorkin, Y., Pand\u017ei\u0107, H., Karri, R.: Cybersecurity of smart electric vehicle charging: a power grid perspective. IEEE Access 8, 214434\u2013214453 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3041074","journal-title":"IEEE Access"},{"issue":"6","key":"9998_CR163","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1109\/TSG.2020.2994177","volume":"11","author":"S Acharya","year":"2020","unstructured":"Acharya, S., Dvorkin, Y., Karri, R.: Public plug-in electric vehicles + grid data: is a new cyberattack vector viable? IEEE Trans. Smart Grid 11(6), 5099\u20135113 (2020). https:\/\/doi.org\/10.1109\/TSG.2020.2994177","journal-title":"IEEE Trans. Smart Grid"},{"key":"9998_CR164","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100508","volume":"18","author":"EJ Saad","year":"2022","unstructured":"Saad, E.J., Eric, B.: Secure firmware over-the-air updates for IoT: survey, challenges, and discussions. Internet Things 18, 100508 (2022). https:\/\/doi.org\/10.1016\/j.iot.2022.100508","journal-title":"Internet Things"},{"key":"9998_CR165","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103599","volume":"213","author":"P Li","year":"2023","unstructured":"Li, P., Ou, W., Liang, H., Han, W., Zhang, Q., Zeng, G.: A zero trust and blockchain-based defense model for smart electric vehicle chargers. J. Netw. Comput. Appl. 213, 103599 (2023). https:\/\/doi.org\/10.1016\/j.jnca.2023.103599","journal-title":"J. Netw. Comput. Appl."},{"key":"9998_CR166","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.future.2022.06.013","volume":"136","author":"M Shokry","year":"2022","unstructured":"Shokry, M., Awad, A.I., Abd-Ellah, M.K., Khalaf, A.A.M.: Systematic survey of advanced metering infrastructure security: vulnerabilities, attacks, countermeasures, and future vision. Futur. Gener. Comput. Syst. 136, 358\u2013377 (2022). https:\/\/doi.org\/10.1016\/j.future.2022.06.013","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9998_CR167","doi-asserted-by":"publisher","unstructured":"Bhattarai, H., Kulkarni, A., Niamat, M.: Trust score-based zero trust architecture for advanced metering infrastructure security. In: NAECON 2024 - IEEE National Aerospace and Electronics Conference, pp. 334\u2013339 (2024). https:\/\/doi.org\/10.1109\/NAECON61878.2024.10670642","DOI":"10.1109\/NAECON61878.2024.10670642"},{"key":"9998_CR168","doi-asserted-by":"publisher","unstructured":"Yang, C., Han, S., Bin, D., Ling, Y., Fu, H.: Research on the application of zero trust framework in the design of power system network architecture. In: Cheng, H.S., Pelusi, D. (eds.) Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023), pp. 13073, 130731. SPIE (2024). https:\/\/doi.org\/10.1117\/12.3026713 . International Society for Optics and Photonics","DOI":"10.1117\/12.3026713"},{"key":"9998_CR169","doi-asserted-by":"publisher","unstructured":"Zhang, X., Jin, S., Li, B.: A zero trust-based approach for secure terminal access in distributed power grids. In: 2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA), pp. 67\u201371 (2023). https:\/\/doi.org\/10.1109\/ICDSCA59871.2023.10393424","DOI":"10.1109\/ICDSCA59871.2023.10393424"},{"key":"9998_CR170","doi-asserted-by":"publisher","unstructured":"Bartwal, U., Mukhopadhyay, S., Negi, R., Shukla, S.: Security orchestration, automation, and response engine for deployment of behavioural honeypots. In: 2022 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/DSC54232.2022.9888808","DOI":"10.1109\/DSC54232.2022.9888808"},{"key":"9998_CR171","doi-asserted-by":"publisher","unstructured":"Vast, R., Sawant, S., Thorbole, A., Badgujar, V.: Artificial intelligence based security orchestration, automation and response system. In: 2021 6th International Conference for Convergence in Technology (I2CT), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/I2CT51068.2021.9418109","DOI":"10.1109\/I2CT51068.2021.9418109"},{"key":"9998_CR172","doi-asserted-by":"publisher","unstructured":"Hirai, M., Kotani, D., Okabe, Y.: Linking contexts from distinct data sources in zero trust federation. In: Saracino, A., Mori, P. (eds.) Emerging Technologies for Authorization and Authentication, pp. 136\u2013144. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-25467-3_9","DOI":"10.1007\/978-3-031-25467-3_9"},{"issue":"5","key":"9998_CR173","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1016\/j.dcan.2023.01.021","volume":"10","author":"F Tang","year":"2024","unstructured":"Tang, F., Ma, C., Cheng, K.: Privacy-preserving authentication scheme based on zero trust architecture. Digit. Commun. Netw. 10(5), 1211\u20131220 (2024). https:\/\/doi.org\/10.1016\/j.dcan.2023.01.021","journal-title":"Digit. Commun. Netw."},{"key":"9998_CR174","doi-asserted-by":"publisher","unstructured":"Nana, H., Yuanyuan, Y.: A research on data secure access control mechanism based on zero trust and attribute encryption in medical cloud. In: 2022 IEEE 8th International Conference on Computer and Communications (ICCC), pp. 1400\u20131404 (2022). https:\/\/doi.org\/10.1109\/ICCC56324.2022.10065956","DOI":"10.1109\/ICCC56324.2022.10065956"},{"key":"9998_CR175","doi-asserted-by":"publisher","unstructured":"Kulkarni, A., Niraula, A., Bhattarai, H., Niamat, M.: A zero trust architecture employing blockchain and ring oscillator physical unclonable function for Internet-of-Things. In: 2024 IEEE International Conference on Electro Information Technology (eIT), pp. 508\u2013513 (2024). https:\/\/doi.org\/10.1109\/eIT60633.2024.10609880","DOI":"10.1109\/eIT60633.2024.10609880"},{"key":"9998_CR176","doi-asserted-by":"publisher","unstructured":"Munasinghe, S., Piyarathna, N., Wijerathne, E., Jayasinghe, U., Namal, S.: Machine learning based zero trust architecture for secure networking. In: 2023 IEEE 17th International Conference on Industrial and Information Systems (ICIIS), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/ICIIS58898.2023.10253610","DOI":"10.1109\/ICIIS58898.2023.10253610"},{"key":"9998_CR177","doi-asserted-by":"publisher","unstructured":"Albshaier, L., Almarri, S., Albuali, A.: Federated learning for cloud and edge security: a systematic review of challenges and AI opportunities. Electronics (2025). https:\/\/doi.org\/10.3390\/electronics14051019","DOI":"10.3390\/electronics14051019"},{"key":"9998_CR178","doi-asserted-by":"publisher","unstructured":"Yiliyaer, S., Kim, Y.: Secure access service edge: a zero trust based framework for accessing data securely. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0586\u20130591 (2022). https:\/\/doi.org\/10.1109\/CCWC54503.2022.9720872","DOI":"10.1109\/CCWC54503.2022.9720872"},{"issue":"1","key":"9998_CR179","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/10919392.2020.1831870","volume":"31","author":"S Dhar","year":"2021","unstructured":"Dhar, S., Bose, I.: Securing IoT devices using zero trust and blockchain. J. Organ. Comput. Electron. Commer. 31(1), 18\u201334 (2021). https:\/\/doi.org\/10.1080\/10919392.2020.1831870","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"9998_CR180","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101419","volume":"28","author":"U Ashraf","year":"2024","unstructured":"Ashraf, U., Al-Naeem, M., Bhutta, M.N.M., Yuen, C.: ZFORT: a scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs. Internet Things 28, 101419 (2024). https:\/\/doi.org\/10.1016\/j.iot.2024.101419","journal-title":"Internet Things"},{"key":"9998_CR181","doi-asserted-by":"publisher","first-page":"45360","DOI":"10.1109\/ACCESS.2019.2902501","volume":"7","author":"J Abou Jaoude","year":"2019","unstructured":"Abou Jaoude, J., George Saade, R.: Blockchain applications - usage in different domains. IEEE Access 7, 45360\u201345381 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2902501","journal-title":"IEEE Access"},{"key":"9998_CR182","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li, L., Fan, Y., Tse, M., Lin, K.-Y.: A review of applications in federated learning. Comput. Ind. Eng. 149, 106854 (2020). https:\/\/doi.org\/10.1016\/j.cie.2020.106854","journal-title":"Comput. Ind. Eng."},{"key":"9998_CR183","doi-asserted-by":"publisher","unstructured":"Mutaher, H., Kumar, P.: Security-enhanced sdn controller based kerberos authentication protocol. In: 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 672\u2013677 (2021). https:\/\/doi.org\/10.1109\/Confluence51648.2021.9377044","DOI":"10.1109\/Confluence51648.2021.9377044"},{"key":"9998_CR184","doi-asserted-by":"publisher","unstructured":"Hatakeyama, K., Kotani, D., Okabe, Y.: Zero trust federation: sharing context under user control towards zero trust in identity federation. In: 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops), pp. 514\u2013519 (2021). https:\/\/doi.org\/10.1109\/PerComWorkshops51409.2021.9431116","DOI":"10.1109\/PerComWorkshops51409.2021.9431116"},{"key":"9998_CR185","doi-asserted-by":"publisher","unstructured":"Islam, M.N., Colomo-Palacios, R., Chockalingam, S.: Secure access service edge: a multivocal literature review. In: 2021 21st International Conference on Computational Science and Its Applications (ICCSA), pp. 188\u2013194 (2021). https:\/\/doi.org\/10.1109\/ICCSA54496.2021.00034","DOI":"10.1109\/ICCSA54496.2021.00034"},{"key":"9998_CR186","doi-asserted-by":"publisher","unstructured":"Troia, S., Moreira\u00a0Zorello, L.M., Maier, G.: SD-WAN: how the control of the network can be shifted from core to edge. In: 2021 International Conference on Optical Network Design and Modeling (ONDM), pp. 1\u20133 (2021). https:\/\/doi.org\/10.23919\/ONDM51796.2021.9492375","DOI":"10.23919\/ONDM51796.2021.9492375"},{"key":"9998_CR187","unstructured":"Cybersecurity Insiders: 2024 VPN Risk Report (2024). https:\/\/www.cybersecurity-insiders.com\/2024-vpn-risk-report-hpe\/"},{"key":"9998_CR188","doi-asserted-by":"publisher","unstructured":"Xu, M., Chen, B., Tan, Z., Chen, S., Wang, L., Liu, Y., San, T.I., Fong, S.W., Wang, W., Feng, J.: AHAC: advanced network-hiding access control framework. Appl. Sci. (2024) https:\/\/doi.org\/10.3390\/app14135593","DOI":"10.3390\/app14135593"},{"key":"9998_CR189","doi-asserted-by":"publisher","unstructured":"Li, D., Yang, Z., Yu, S., Duan, M., Yang, S.: A micro-segmentation method based on vlan-vxlan mapping technology. Future Internet (2024) https:\/\/doi.org\/10.3390\/fi16090320","DOI":"10.3390\/fi16090320"},{"issue":"5","key":"9998_CR190","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSEC.2024.3432208","volume":"22","author":"KG Crowther","year":"2024","unstructured":"Crowther, K.G.: Blending shared responsibility and zero trust to secure the industrial Internet of Things. IEEE Secur. Privacy 22(5), 96\u2013102 (2024). https:\/\/doi.org\/10.1109\/MSEC.2024.3432208","journal-title":"IEEE Secur. Privacy"},{"issue":"2","key":"9998_CR191","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/s11633-023-1456-2","volume":"21","author":"Y Cao","year":"2024","unstructured":"Cao, Y., Pokhrel, S.R., Zhu, Y., Doss, R., Li, G.: Automation and orchestration of zero trust architecture: potential solutions and challenges. Mach. Intell. Res. 21(2), 294\u2013317 (2024). https:\/\/doi.org\/10.1007\/s11633-023-1456-2","journal-title":"Mach. Intell. Res."},{"key":"9998_CR192","doi-asserted-by":"publisher","unstructured":"Weinberg, A.I., Cohen, K.: Zero trust implementation in the emerging technologies era: a survey. Complex Eng. Syst. (2024) https:\/\/doi.org\/10.20517\/ces.2024.41","DOI":"10.20517\/ces.2024.41"},{"key":"9998_CR193","unstructured":"Cunningham, C.: A look back at zero trust: Never trust, always verify (2020). https:\/\/www.forrester.com\/blogs\/a-look-back-at-zero-trust-never-trust-always-verify\/"},{"key":"9998_CR194","doi-asserted-by":"publisher","unstructured":"Wolter, K., Reinecke, P.: Performance and security tradeoff. In: International School on Formal Methods for the Design of Computer, Communication and Software Systems, pp. 135\u2013167 (2010) https:\/\/doi.org\/10.1007\/978-3-642-13678-8_4","DOI":"10.1007\/978-3-642-13678-8_4"},{"key":"9998_CR195","unstructured":"Turan, M.S., McKay, K., Chang, D., Kang, J., Waller, N., Kelsey, J.M., Bassham, L.E., Hong, D.: Status report on the final round of the nist lightweight cryptography standardization process. Technical report, National Institute of Standards and Technology (NIST) (2023). https:\/\/www.nist.gov\/publications\/status-report-final-round-nist-lightweight-cryptography-standardization-process"},{"key":"9998_CR196","doi-asserted-by":"publisher","unstructured":"Boltz, N., Schmid, L., Taghavi, B., Gerking, C., Heinrich, R.: Modeling and analyzing zero trust architectures regarding performance and security. Software Architecture, Cham, pp. 253\u2013269 (2024).https:\/\/doi.org\/10.1007\/978-3-031-70797-1_17","DOI":"10.1007\/978-3-031-70797-1_17"},{"key":"9998_CR197","doi-asserted-by":"publisher","unstructured":"Basta, N., Ikram, M., Kaafar, M.A., Walker, A.: Towards a zero-trust micro-segmentation network security strategy: an evaluation framework. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20137 (2022).https:\/\/doi.org\/10.1109\/NOMS54207.2022.9789888","DOI":"10.1109\/NOMS54207.2022.9789888"},{"key":"9998_CR198","doi-asserted-by":"publisher","unstructured":"Zhang, C., He, J., Fan, B., Gong, Y., Li, S., Yin, B., Lin, Y.: Tag-based trust evaluation in zero trust architecture. In: 2022 4th International Academic Exchange Conference on Science and Technology Innovation (IAECST), pp. 772\u2013776 (2022). https:\/\/doi.org\/10.1109\/IAECST57965.2022.10062213","DOI":"10.1109\/IAECST57965.2022.10062213"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09998-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09998-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09998-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:13:24Z","timestamp":1769915604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09998-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":198,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["9998"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09998-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.173933211.18231232\/v1","asserted-by":"object"}]},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"27 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"25"}}