{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:55:39Z","timestamp":1775562939411,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:00:00Z","timestamp":1772496000000},"content-version":"vor","delay-in-days":61,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.028","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"590-597","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Bridging the Zero Trust Gap: A Knowledge Management Approach to Business Data Protection"],"prefix":"10.1016","volume":"278","author":[{"given":"Mona A.","family":"Mohamed","sequence":"first","affiliation":[]},{"given":"Beenish M.","family":"Chaudhry","sequence":"additional","affiliation":[]},{"given":"Joyram","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Kevin J.","family":"O\u2019Sullivan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.03.028_bib1","unstructured":"Rose, S., et al. (2020) \"NIST Special Publication 800-207: Zero Trust Architecture\". National Institute of Standards and Technology: Gaithersburg, MD, USA. 1\u201359"},{"key":"10.1016\/j.procs.2026.03.028_bib2","unstructured":"Kindervag, J., S. Balaouras, and l. coit (2010) \"Build Security Into Your Network\u2019s DNA: The Zero Trust Network Architecture\". Forrester: Cambridge, MA"},{"key":"10.1016\/j.procs.2026.03.028_bib3","unstructured":"Lopez, C.T. (2025) \"REACHING \"ZERO TRUST\".\" The Military Engineer, 117(757): 19"},{"issue":"6","key":"10.1016\/j.procs.2026.03.028_bib4","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.62225\/2583049X.2024.4.6.4357","article-title":"\"Implementing Zero Trust Security in Multi-Cloud Microservices Platforms: A Review and Architectural Framework.\"","volume":"4","author":"Segun Adanigbo","year":"2024","journal-title":"International Journal of Advanced Multidisciplinary Research and Studies"},{"key":"10.1016\/j.procs.2026.03.028_bib5","doi-asserted-by":"crossref","unstructured":"Hosney, E.S., I.T.A. Halim, and A.H. Yousef.(2022) \"An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA)\". in 2022 5th International Conference on Computing and Informatics (ICCI), Computing and Informatics (ICCI), 2022 5th International Conference on. 2022. Cairo, Egypt: IEEE 343\u2013350.","DOI":"10.1109\/ICCI54321.2022.9756117"},{"key":"10.1016\/j.procs.2026.03.028_bib6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2022.102911","article-title":"\"An analysis of zero-trust architecture and its cost-effectiveness for organizational security.\"","volume":"122","author":"Adahman","year":"2022","journal-title":"Computers & Security"},{"key":"10.1016\/j.procs.2026.03.028_bib7","first-page":"1","article-title":"\"A Survey on Zero Trust Architecture: Challenges and Future Trends.\"","volume":"2022","author":"Yuanhang","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"12","key":"10.1016\/j.procs.2026.03.028_bib8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.18535\/raj.v7i12.542","article-title":"\"Zero Trust in Practice: How Enterprises Are Implementing Zero Trust Architectures Across Multi-Cloud System.\"","volume":"7","author":"Thambireddy","year":"2024","journal-title":"Research and Analysis Journal"},{"key":"10.1016\/j.procs.2026.03.028_bib9","doi-asserted-by":"crossref","unstructured":"Gutmann, A., et al.(2016) \"ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology\". in 2016 IEEE European Symposium on Security & Privacy (EuroS&P). 2016. Saarbr\u00fccken, Germany: IEEE 357\u2013371.","DOI":"10.1109\/EuroSP.2016.35"},{"issue":"2","key":"10.1016\/j.procs.2026.03.028_bib10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/S1353-4858(14)70023-6","article-title":"\"In search of a new perimeter.\"","volume":"2014","author":"Gold","year":"2014","journal-title":"Network Security"},{"key":"10.1016\/j.procs.2026.03.028_bib11","unstructured":"Kindervag, J., S. balaouras, and L. Coit (2010) \"No More Chewy Centers: Introducing The Zero Trust Model Of Information Security\", F. Research, Editor., Forester Research: Cambridge, MA. 1\u201315"},{"key":"10.1016\/j.procs.2026.03.028_bib12","unstructured":"Rose, S., et al. (2020) \"Zero Trust Architecture\", in NIST Special Publication 800-207, D.o.C. NIST, Editor., NIST: Washigton. 1\u201359"},{"key":"10.1016\/j.procs.2026.03.028_bib13","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1109\/TIFS.2023.3264152","article-title":"\"SysFlow: Toward a Programmable Zero Trust Framework for System Security.\"","volume":"18","author":"Hong","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security, Information Forensics and Security"},{"key":"10.1016\/j.procs.2026.03.028_bib14","doi-asserted-by":"crossref","unstructured":"Daki\u0107, V., et al. (2024) \"Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations.\" Journal of cybersecurity and privacy, 5(1): 2","DOI":"10.3390\/jcp5010002"},{"key":"10.1016\/j.procs.2026.03.028_bib15","unstructured":"Borchert, O., et al. (2022) \"Implementing a Zero Trust Architecture Volume B: Approach, Architecture, and Security Characteristics\", T.D.O. Commerce, Editor., NIST: Gaithersburg, MD. 185"},{"key":"10.1016\/j.procs.2026.03.028_bib16","unstructured":"Kerman, A., et al. (2022) \"Implementing a Zero Trust Architecture E: Risk and Compliance Management\", T.D. OfCommerce, Editor., NIST: Gaithersburg, MD. 65"},{"key":"10.1016\/j.procs.2026.03.028_bib17","doi-asserted-by":"crossref","unstructured":"Hatakeyama, K., D. Kotani, and Y. Okabe.(2021) \"Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation\". in 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021 IEEE International Conference on. 2021. Kassel, Germany: IEEE 514\u2013519.","DOI":"10.1109\/PerComWorkshops51409.2021.9431116"},{"issue":"1","key":"10.1016\/j.procs.2026.03.028_bib18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1186\/s13677-025-00764-7","article-title":"\"SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture.\"","volume":"14","author":"Lilhore","year":"2025","journal-title":"Journal of cloud computing: advances, systems and applications"},{"issue":"10","key":"10.1016\/j.procs.2026.03.028_bib19","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.2021.3090018","article-title":"\"Zero Trust: The What, How, Why, and When.\"","volume":"54","author":"Shore","year":"2021","journal-title":"Computer"},{"key":"10.1016\/j.procs.2026.03.028_bib20","unstructured":"Kerman, A., et al. (2022) \"Implementing a Zero Trust Architecture: A: Executive Summary\", in NIST Special Publication, D.o. Commerce\/NIST, Editor., NIST: Rockville, MD. 5"},{"issue":"3","key":"10.1016\/j.procs.2026.03.028_bib21","first-page":"1","article-title":"\"A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.\"","volume":"23","author":"Keke","year":"2023","journal-title":"ACM Transactions on Internet Technology"},{"issue":"6","key":"10.1016\/j.procs.2026.03.028_bib22","doi-asserted-by":"crossref","first-page":"2200","DOI":"10.1109\/JSAC.2025.3560006","article-title":"\"A Zero Trust Data-Driven Perspective on PKI Root Stores.\"","volume":"43","author":"Farina","year":"2025","journal-title":"IEEE journal on selected areas in communications"},{"key":"10.1016\/j.procs.2026.03.028_bib23","doi-asserted-by":"crossref","unstructured":"Arfeen, A., et al.(2021) \"Endpoint Detection & Response: A Malware Identification Solution\". in 2021 International Conference on Cyber Warfare and Security (ICCWS), Cyber Warfare and Security (ICCWS), 2021 International Conference on. 2021. Tennessee Tech Cyberse-curity Education, Research and Outreach Center (CEROC), Computer Science department and the Oak Ridge National Laboratory: IEEE 1\u20138.","DOI":"10.1109\/ICCWS53234.2021.9703010"},{"key":"10.1016\/j.procs.2026.03.028_bib24","doi-asserted-by":"crossref","unstructured":"Manan, A., et al.(2022) \"Extending 5G services with Zero Trust security pillars: a modular approach\". in 2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Computer Systems and Applications (AICCSA), 2022 IEEE\/ACS 19th International Conference on. 2022. Abu Dhabi, UAE: IEEE 1\u20136.","DOI":"10.1109\/AICCSA56895.2022.10017774"},{"key":"10.1016\/j.procs.2026.03.028_bib25","doi-asserted-by":"crossref","unstructured":"Ali, A., et al.(2023) \"The Effect of Artificial Intelligence on Cybersecurity\". in 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Business Analytics for Technology and Security (ICBATS), 2023 International Conference on. 2023. Meydan Racecourse Al Meydan Road, Nad Al Sheba, Dubai, United Arab Emirates.: IEEE 1\u20137.","DOI":"10.1109\/ICBATS57792.2023.10111151"},{"issue":"3","key":"10.1016\/j.procs.2026.03.028_bib26","first-page":"1111","article-title":"\"ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Medical Errors in the Era of Generative AI and Cloud-Based Health Information Ecosystems.\"","volume":"5","author":"Al-hammuri","year":"2024","journal-title":"AI (Basel)"},{"issue":"3","key":"10.1016\/j.procs.2026.03.028_bib27","first-page":"1","article-title":"\"Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City.\"","volume":"23","author":"Wang","year":"2023","journal-title":"ACM Transactions on Internet Technology"},{"issue":"2","key":"10.1016\/j.procs.2026.03.028_bib28","doi-asserted-by":"crossref","first-page":"4159","DOI":"10.30574\/ijsra.2024.13.2.2583","article-title":"\"Zero trust architecture and AI: A synergistic approach to next-generation cybersecurity frameworks.\"","volume":"13","author":"Ebuka Mmaduekwe","year":"2024","journal-title":"International Journal of Science and Research Archive"},{"issue":"1","key":"10.1016\/j.procs.2026.03.028_bib29","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/IJKM.2019010103","article-title":"\"Integrating knowledge management into information security: From audit to practice.\"","volume":"15","author":"Au","year":"2019","journal-title":"International Journal of Knowledge Management"},{"key":"10.1016\/j.procs.2026.03.028_bib30","unstructured":"Coombs, R., R. Hull, and M. Peltu (1998) \"Knowledge management practices for innovation: an audit tool for improvement\", in CRIC working papers; no 6. University of Manchester Centre for Research on Innovation and Competition: Manchester"},{"issue":"1","key":"10.1016\/j.procs.2026.03.028_bib31","first-page":"36","article-title":"\"How Not Deploying Zero Trust Data with AI May Risk Team Safety, Mission Failure.\"","volume":"35","author":"Miller","year":"2025","journal-title":"Security technology & design"},{"issue":"3","key":"10.1016\/j.procs.2026.03.028_bib32","doi-asserted-by":"crossref","first-page":"40","DOI":"10.2307\/41165942","article-title":"\"The Concept of \"Ba\": Building a Foundation for Knowledge Creation.\"","volume":"40","author":"Nonaka","year":"1998","journal-title":"California Management Review"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006204?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926006204?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:09:26Z","timestamp":1775560166000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926006204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":32,"alternative-id":["S1877050926006204"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.028","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bridging the Zero Trust Gap: A Knowledge Management Approach to Business Data Protection","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.028","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}