{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T15:11:17Z","timestamp":1771427477919,"version":"3.50.1"},"reference-count":103,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.compeleceng.2026.111002","type":"journal-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:39:42Z","timestamp":1770842382000},"page":"111002","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Trust scoring algorithms for zero trust-based software-defined perimeter architectures: A systematic literature review of advancements, challenges, and future directions"],"prefix":"10.1016","volume":"132","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6218-8203","authenticated-orcid":false,"given":"Francis A.","family":"Ruambo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Ivandro O.","family":"Lopes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5365-904X","authenticated-orcid":false,"given":"Bin","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1058-0996","authenticated-orcid":false,"given":"Ammar","family":"Muthanna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7070-6699","authenticated-orcid":false,"given":"Muhammad","family":"Zakarya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1165-7812","authenticated-orcid":false,"given":"Mohammed Saleh Ali","family":"Muthanna","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111002_b1","series-title":"Zero trust security: an enterprise guide","author":"Garbis","year":"2021"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111002_b2","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/MNET.2019.1800324","article-title":"Software-defined perimeter (SDP): State of the art secure solution for modern networks","volume":"33","author":"Moubayed","year":"2019","journal-title":"IEEE Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b3","series-title":"Software defined perimeter security","author":"CSA","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111002_b4","series-title":"Zero trust architecture","first-page":"59","author":"Scott","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111002_b5","series-title":"Zero trust networks: building secure systems in untrusted network","author":"Rais","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b6","series-title":"Commandments v1.2","author":"Jericho Forum","year":"2005"},{"key":"10.1016\/j.compeleceng.2026.111002_b7","series-title":"NSTAC report to the president on zero trust and trusted identity management","author":"Cybersecurity and Infrastructure Security Agency","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b8","series-title":"Proceedings of the 2023 IEEE 22nd international conference on trust, security and privacy in computing and communications","first-page":"1422","article-title":"Zero trust score-based network-level access control in enterprise networks","author":"Bradatsch","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b9","series-title":"Zero trust will change the way we design and build networks","author":"Kindervag","year":"2010"},{"key":"10.1016\/j.compeleceng.2026.111002_b10","series-title":"Build security into your network\u2019s DNA: The zero trust network architecture","author":"Kindervag","year":"2010"},{"key":"10.1016\/j.compeleceng.2026.111002_b11","series-title":"Securing sdn\/nfv-enabled campus networks with software-defined perimeter-based zero-trust architecture","author":"Ruambo","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b12","series-title":"No more chewy centers: Introducing the zero trust model of information security","author":"Kindervag","year":"2010"},{"key":"10.1016\/j.compeleceng.2026.111002_b13","article-title":"Trust level evaluation engine for dynamic trust assessment with reference to subjective logic","volume":"vol. 694","author":"Petrovska","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b14","article-title":"Continuous authorization architecture for dynamic trust evaluation","volume":"vol. 694","author":"Joumaa","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111002_b15","first-page":"105","article-title":"Defending against identity threats using risk-based authentication","volume":"23","author":"Dasu","year":"2023","journal-title":"Cybern Inf Technol"},{"key":"10.1016\/j.compeleceng.2026.111002_b16","series-title":"Proceedings of the IEEE national aerospace electronics conference","first-page":"334","article-title":"Trust score-based zero trust architecture for advanced metering infrastructure security","author":"Bhattarai","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b17","series-title":"Software defined perimeter (SDP): A primer for CIOs","first-page":"1","author":"Koilpillai","year":"2017"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111002_b18","doi-asserted-by":"crossref","first-page":"18599","DOI":"10.1038\/s41598-025-01080-5","article-title":"Brute-force attack mitigation on remote access services via software-defined perimeter","volume":"15","author":"Ruambo","year":"2025","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2026.111002_b19","series-title":"Lect. notes informatics (LNI), proc. - ser. gesellschaft fur informatik","first-page":"53","article-title":"Context-based access control and trust scores in zero trust campus networks","volume":"vol. P-301","author":"Lukaseder","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111002_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107952","article-title":"An adaptive trust model based on recommendation filtering algorithm for the internet of things systems","volume":"190","author":"Chen","year":"2021","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b21","series-title":"IoTBDS 2017 - proceedings of the 2nd international conference on internet of things, big data and security","first-page":"400","article-title":"Situational awareness based risk-adaptable access control in enterprise networks","author":"Lee","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.111002_b22","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2025.3570290","article-title":"A novel lightweight dynamic trust evaluation model for edge computing","author":"Yang","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111002_b23","first-page":"1","article-title":"A survey on trust evaluation based on machine learning","volume":"53","author":"Wang","year":"2020","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2026.111002_b24","series-title":"Cybersecurity, cybercrimes, and smart emerging technologies","first-page":"316","article-title":"Enhanced backdoor resilience in cross-platform systems using zero trust based software defined perimeter architecture powered with SnortML IDS\/IPS","author":"Ruambo","year":"2025"},{"issue":"17","key":"10.1016\/j.compeleceng.2026.111002_b25","doi-asserted-by":"crossref","first-page":"9551","DOI":"10.3390\/app15179551","article-title":"A trust score-based access control model for zero trust architecture: Design, sensitivity analysis, and real-world performance evaluation","volume":"15","author":"Jeong","year":"2025","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.111002_b26","series-title":"2022 IEEE conference on communications and network security","first-page":"359","article-title":"Trust threshold policy for explainable and adaptive zero-trust defense in enterprise networks","author":"Ge","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b27","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1109\/TIFS.2023.3264152","article-title":"SysFlow: Toward a programmable zero trust framework for system security","volume":"18","author":"Hong","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.compeleceng.2026.111002_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/6476274","article-title":"A survey on zero trust architecture: Challenges and future trends","volume":"2022","author":"He","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111002_b29","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.3390\/s24041328","article-title":"A review and comparative analysis of relevant approaches of zero trust network model","volume":"24","author":"Dhiman","year":"2024","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111002_b30","article-title":"Zero trust security paradigm: A comprehensive survey and research analysis","volume":"19","author":"Ashfaq","year":"2023","journal-title":"J Electr Syst"},{"key":"10.1016\/j.compeleceng.2026.111002_b31","doi-asserted-by":"crossref","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero trust architecture (ZTA): A comprehensive survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111002_b32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/7026779","article-title":"SoK: Context and risk aware access control for zero trust systems","volume":"2022","author":"Xiao","year":"2022","journal-title":"Secur Commun Networks"},{"key":"10.1016\/j.compeleceng.2026.111002_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103827","article-title":"Multivocal literature review on zero-trust security implementation","volume":"141","author":"Itodo","year":"2024","journal-title":"Comput Secur"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.111002_b34","doi-asserted-by":"crossref","first-page":"11213","DOI":"10.3390\/su141811213","article-title":"Security of zero trust networks in cloud computing: A comparative review","volume":"14","author":"Sarkar","year":"2022","journal-title":"Sustainability"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111002_b35","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s10796-021-10199-5","article-title":"Future industry internet of things with zero-trust security","volume":"26","author":"Li","year":"2024","journal-title":"Inf Syst Front"},{"key":"10.1016\/j.compeleceng.2026.111002_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2022.109358","article-title":"Intelligent zero trust architecture for 5G\/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN","volume":"217","author":"Ramezanpour","year":"2022","journal-title":"Comput Netw"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111002_b37","doi-asserted-by":"crossref","DOI":"10.3390\/fi16030067","article-title":"A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas","volume":"16","author":"Scalise","year":"2024","journal-title":"Futur Internet"},{"key":"10.1016\/j.compeleceng.2026.111002_b38","doi-asserted-by":"crossref","first-page":"5467","DOI":"10.1109\/OJCOMS.2024.3397044","article-title":"User safety and security in the metaverse: A critical review","volume":"5","author":"Sharma","year":"2024","journal-title":"IEEE Open J Commun Soc"},{"key":"10.1016\/j.compeleceng.2026.111002_b39","series-title":"Computer and cyber security","first-page":"171","article-title":"Analysis of various trust computation methods: A step toward secure FANETs","author":"Singh","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111002_b40","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.iotcps.2023.05.003","article-title":"Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions","volume":"3","author":"Ray","year":"2023","journal-title":"Internet Things Cyber-Physical Syst"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111002_b41","doi-asserted-by":"crossref","DOI":"10.3390\/e25121595","article-title":"Theory and application of zero trust security: A brief survey","volume":"25","author":"Kang","year":"2023","journal-title":"Entropy"},{"key":"10.1016\/j.compeleceng.2026.111002_b42","series-title":"Zero trust security: an enterprise guide","first-page":"7","article-title":"What is zero trust?","author":"Garbis","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111002_b43","series-title":"Software-defined perimeter (SDP) specification v2.0","author":"Alliance","year":"2022"},{"issue":"23","key":"10.1016\/j.compeleceng.2026.111002_b44","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12234825","article-title":"Attribute and user trust score-based zero trust access control model in IoV","volume":"12","author":"Wang","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2026.111002_b45","series-title":"2024 10th international conference on applied system innovation","first-page":"427","article-title":"Survey on reinforcement learning techniques for enhancing security and efficiency in zero trust networks","author":"Ahmadi","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110197","article-title":"Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing","volume":"241","author":"Ali","year":"2024","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b47","series-title":"2018 29th irish signals and systems conference","first-page":"1","article-title":"Access control policy enforcement for zero-trust-networking","author":"Vanickis","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111002_b48","first-page":"85","article-title":"Trust network analysis with subjective logic","volume":"vol. 48","author":"J\u00f8sang","year":"2006"},{"key":"10.1016\/j.compeleceng.2026.111002_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101419","article-title":"ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs","volume":"28","author":"Ashraf","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111002_b50","series-title":"2021 14th international symposium on computational intelligence and design","first-page":"96","article-title":"A zero trust method based on BLP and BIBA model","author":"Tian","year":"2021"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111002_b51","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.comcom.2011.10.007","article-title":"Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1,1) model","volume":"35","author":"Zhang","year":"2012","journal-title":"Comput Commun"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111002_b52","doi-asserted-by":"crossref","first-page":"5411","DOI":"10.1109\/TCE.2024.3412772","article-title":"Artificial intelligence based zero trust security approach for consumer industry","volume":"70","author":"Nagarajan","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"10.1016\/j.compeleceng.2026.111002_b53","doi-asserted-by":"crossref","unstructured":"Buchegger S, Boudec JYL. Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks). In: Proceedings of the international symposium on mobile ad hoc networking and computing. 2002, p. 226\u201336.","DOI":"10.1145\/513800.513828"},{"key":"10.1016\/j.compeleceng.2026.111002_b54","series-title":"2009 29th IEEE international conference on distributed computing systems workshops","first-page":"251","article-title":"A novel hybrid trust management framework for MANETs","author":"Li","year":"2009"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111002_b55","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/info7010004","article-title":"Closed-loop feedback computation model of dynamical reputation based on the local trust evaluation in business-to-consumer e-commerce","volume":"7","author":"Tian","year":"2016","journal-title":"Information"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111002_b56","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.future.2013.05.006","article-title":"Comparative trust management with applications: Bayesian approaches emphasis","volume":"31","author":"Thirunarayan","year":"2014","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.compeleceng.2026.111002_b57","series-title":"Proceedings - 2023 IEEE\/ACM symposium on edge computing","first-page":"306","article-title":"Risk-based zero trust scale for tactical edge network environments","author":"Poduvu","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b58","series-title":"Q2SWinet\u201908: proceedings of the 4th ACM international symposium on qoS and security for wireless and mobile networks","first-page":"83","article-title":"TSR: Trust-based secure MANET routing using HMMs","author":"Moe","year":"2008"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111002_b59","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1016\/j.adhoc.2009.10.002","article-title":"A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks","volume":"8","author":"Jaramillo","year":"2010","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.compeleceng.2026.111002_b60","first-page":"808","article-title":"Cooperation in wireless ad hoc networks","volume":"vol. 2","author":"Srinivasan","year":"2003"},{"key":"10.1016\/j.compeleceng.2026.111002_b61","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/TIFS.2023.3326975","article-title":"GAZETA: Game-theoretic zero-trust authentication for defense against lateral movement in 5G IoT networks","volume":"19","author":"Ge","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111002_b62","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1007\/s00607-024-01269-y","article-title":"Matyas\u2013meyer oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network","volume":"106","author":"Dhanaraj","year":"2024","journal-title":"Computing"},{"issue":"27","key":"10.1016\/j.compeleceng.2026.111002_b63","doi-asserted-by":"crossref","DOI":"10.4108\/eai.25-6-2021.170246","article-title":"Zero-trust based distributed collaborative dynamic access control scheme with deep multi-agent reinforcement learning","volume":"8","author":"Jin","year":"2021","journal-title":"ICST Trans Secur Saf"},{"key":"10.1016\/j.compeleceng.2026.111002_b64","series-title":"2022 4th international academic exchange conference on science and technology innovation","first-page":"772","article-title":"Tag-based trust evaluation in zero trust architecture","author":"Zhang","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b65","series-title":"IEEE INFOCOM 2023-IEEE conference on computer communications workshops","first-page":"1","article-title":"Scenario-agnostic zero-trust defense with explainable threshold policy: A meta-learning approach","author":"Ge","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b66","series-title":"2023 international conference on networking and network applications","first-page":"34","article-title":"A survey of trust assessment technology research for edge computing","author":"Chen","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b67","article-title":"PRISMA 2020 explanation and elaboration: Updated guidance and exemplars for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"10.1016\/j.compeleceng.2026.111002_b68","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110606","article-title":"JAPPI: An unsupervised endpoint application identification methodology for improved zero trust models, risk score calculations and threat detection","volume":"250","author":"Heino","year":"2024","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b69","series-title":"2020 IEEE 19th international conference on trust, security and privacy in computing and communications","first-page":"1801","article-title":"Trust aware continuous authorization for zero trust in consumer internet of things","author":"Dimitrakos","year":"2020"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111002_b70","doi-asserted-by":"crossref","DOI":"10.3390\/info14020129","article-title":"A blockchain-inspired attribute-based zero-trust access control model for IoT","volume":"14","author":"Awan","year":"2023","journal-title":"Information"},{"key":"10.1016\/j.compeleceng.2026.111002_b71","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103434","article-title":"ZTWeb: Cross site scripting detection based on zero trust","volume":"134","author":"Wu","year":"2023","journal-title":"Comput Secur"},{"key":"10.1016\/j.compeleceng.2026.111002_b72","series-title":"Proceedings of ACM symposium on access control models and technologies","first-page":"267","article-title":"Poster: Toward zero-trust path-aware access control","author":"Seaton","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b73","series-title":"2024 2nd international conference on intelligent metaverse technologies and applications","first-page":"18","article-title":"MetaGuard: A zero-trust-based access control for metaverse","author":"Alshamsi","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b74","series-title":"2022 3rd international conference on electronics, communications and information technology","first-page":"397","article-title":"Research on access control model of zero trust based on clustering algorithm","author":"Si","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b75","article-title":"Zero-trust-based protection scheme for users in internet of vehicles","volume":"2022","author":"Fang","year":"2022","journal-title":"Secur Commun Networks"},{"key":"10.1016\/j.compeleceng.2026.111002_b76","series-title":"2021 IEEE 3rd phD colloquium on ethically driven innovation and technology for society","first-page":"1","article-title":"Zero trust-based adaptive authentication using composite attribute set","author":"Krishnan","year":"2021"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111002_b77","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12081906","article-title":"Endpoint device risk-scoring algorithm proposal for zero trust","volume":"12","author":"Park","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2026.111002_b78","article-title":"ZTIMM: A zero-trust-based identity management model for volunteer cloud computing","volume":"vol. 12403","author":"Albuali","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111002_b79","article-title":"Decentralized authentication scheme incorporating reputation and attribute signature for cross-Web3 applications","author":"Song","year":"2025","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111002_b80","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.3390\/ai5030055","article-title":"ZTCloudGuard: Zero trust context-aware access management framework to avoid medical errors in the era of generative AI and cloud-based health information ecosystems","volume":"5","author":"Al-hammuri","year":"2024","journal-title":"AI"},{"key":"10.1016\/j.compeleceng.2026.111002_b81","series-title":"CODASPY 2023 - proceedings of the 13th ACM conference on data and application security and privacy","first-page":"283","article-title":"Utilizing the DLBAC approach toward a ZT score-based authorization for IoT systems","author":"Ameer","year":"2023"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111002_b82","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12051105","article-title":"Real-time reliability access control based on rail traffic data platform","volume":"12","author":"Yu","year":"2023","journal-title":"Electronics"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111002_b83","doi-asserted-by":"crossref","DOI":"10.1145\/3671147","article-title":"ZTA-IoT: A novel architecture for zero-trust in IoT systems and an ensuing usage control model","volume":"27","author":"Ameer","year":"2024","journal-title":"ACM Trans Priv Secur"},{"key":"10.1016\/j.compeleceng.2026.111002_b84","series-title":"Proceedings of 2023 CAA symposium on fault detection, supervision and safety for technical processes","first-page":"1","article-title":"Trust evaluation of topological nodes in intelligent connected vehicles communication network under zero-trust environment","author":"Cui","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b85","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109435","article-title":"Personalized device authentication scheme using Q-learning-based decision-making with the aid of transfer fuzzy learning for iIoT devices in zero trust network (PDA-QLTFL)","volume":"118","author":"Singh","year":"2024","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111002_b86","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3429197","article-title":"Towards a performance-based trustworthy edge-cloud continuum","author":"Dhanapala","year":"2024","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111002_b87","article-title":"Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework","volume":"34","author":"Ali","year":"2023","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10.1016\/j.compeleceng.2026.111002_b88","series-title":"2022 IEEE 8th world forum on internet of things","first-page":"1","article-title":"User behaviour risk evaluation in zero trust architecture environment","author":"Yunanto","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b89","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.112906","article-title":"Privacy-preserving federated UAV data collection framework for autonomous path optimization in maritime operations","volume":"173","author":"Min","year":"2025","journal-title":"Appl Soft Comput"},{"key":"10.1016\/j.compeleceng.2026.111002_b90","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111459","article-title":"Asynchronous federated learning based zero trust architecture for the next generation industrial control systems","author":"Lv","year":"2025","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b91","series-title":"2023 7th international conference on electrical, mechanical and computer engineering","first-page":"898","article-title":"Zero trust unified access control based on multi-scenario fusion training","author":"Sheng","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b92","series-title":"2021 IEEE international conference on pervasive computing and communications workshops and other affiliated events","first-page":"514","article-title":"Zero trust federation: Sharing context under user control towards zero trust in identity federation","author":"Hatakeyama","year":"2021"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111002_b93","article-title":"Suitable scalability management model for software-defined perimeter based on zero-trust model","volume":"7","author":"Tanimoto","year":"2023","journal-title":"Int J Serv Knowl Manag"},{"key":"10.1016\/j.compeleceng.2026.111002_b94","series-title":"2023 IEEE 17th international conference on industrial and information systems","first-page":"1","article-title":"Machine learning based zero trust architecture for secure networking","author":"Munasinghe","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111002_b95","article-title":"Adaboost algorithm in trustworthy network for anomaly intrusion detection","author":"Guo","year":"2022","journal-title":"Appl Math Nonlinear Sci"},{"key":"10.1016\/j.compeleceng.2026.111002_b96","series-title":"Proceedings of international conference on ICT for sustainable development: ICT4SD 2015 volume 2","first-page":"345","article-title":"An insider cyber threat prediction mechanism based on behavioral analysis","author":"Bhavsar","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.111002_b97","article-title":"A review for insider threats detection using machine learning","volume":"vol. 2555","author":"Mittal","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111002_b98","series-title":"2021 international conference on cyber situational awareness, data analytics and assessment","first-page":"1","article-title":"Zero trust: Never trust, always verify","author":"Wylde","year":"2021"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111002_b99","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-024-02348-6","article-title":"An adversarial environment reinforcement learning-driven intrusion detection algorithm for internet of things","volume":"2024","author":"Mahjoub","year":"2024","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b100","article-title":"Build resilient infrastructure, promote inclusive and sustainable industrialization and foster innovation","author":"Our World in Data team","year":"2023","journal-title":"Our World Data"},{"key":"10.1016\/j.compeleceng.2026.111002_b101","series-title":"2024 8th international conference on computational system and information technology for sustainable solutions","first-page":"1","article-title":"AI-driven zero trust architecture: Enhancing cyber-security resilience","author":"Chokkanathan","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111002_b102","article-title":"Toward mixture-of-experts enabled trustworthy semantic communication for 6G networks","author":"He","year":"2024","journal-title":"IEEE Netw"},{"key":"10.1016\/j.compeleceng.2026.111002_b103","article-title":"Enhancing physical layer communication security through generative AI with mixture of experts","author":"Zhao","year":"2025","journal-title":"IEEE Wirel Commun"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626000741?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626000741?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T14:13:05Z","timestamp":1771423985000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626000741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":103,"alternative-id":["S0045790626000741"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111002","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trust scoring algorithms for zero trust-based software-defined perimeter architectures: A systematic literature review of advancements, challenges, and future directions","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111002"}}