{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:54:16Z","timestamp":1774536856916,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/aiccsa56895.2022.10017774","type":"proceedings-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T19:11:22Z","timestamp":1674241882000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Extending 5G services with Zero Trust security pillars: a modular approach"],"prefix":"10.1109","author":[{"given":"Abdul","family":"Manan","sequence":"first","affiliation":[{"name":"Brown University,Providence,RI,USA"}]},{"given":"Ziran","family":"Min","sequence":"additional","affiliation":[{"name":"Vanderbilt University,Nashville,TN,USA"}]},{"given":"Charif","family":"Mahmoudi","sequence":"additional","affiliation":[{"name":"Siemens Technology,Princeton,NJ,USA"}]},{"given":"Valerio","family":"Formicola","sequence":"additional","affiliation":[{"name":"California Polytechnic State University,Pomona,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","year":"2019","journal-title":"Technical specification group services and system aspects, security architecture and procedures for 5g system, technical specification, etsi 3rd generation partnership project (3gpp), 3gpp ts 33.501 version 15.4.0"},{"key":"ref2","article-title":"ACM International Conference Proceeding Series","volume-title":"INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3178760"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000508"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.3011081"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041042"},{"key":"ref9","article-title":"Infrastructure Security Agency, and Cybersecurity Division","year":"2021","journal-title":"Zero trust maturity model"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418203"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102726"},{"key":"ref12","year":"2021","journal-title":"Executive order on improving the nations cybersecurity - the white house"},{"key":"ref13","year":"2022","journal-title":"Moving the u.s. government toward zero trust cybersecurity principles"},{"key":"ref14","author":"Kerman","year":"2020","journal-title":"Implementing a zero trust architecture"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10199-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/9781119293071"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI48352.2020.9104214"},{"key":"ref18","article-title":"Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021","volume-title":"Dynamic slice scaling mechanisms for 5G multi-domain environments"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109358"},{"key":"ref20","author":"Rose","year":"2020","journal-title":"Zero trust architecture, 2020-08-10 04:08:00"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9947347"}],"event":{"name":"2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2022,12,5]]},"end":{"date-parts":[[2022,12,8]]}},"container-title":["2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10017434\/10017304\/10017774.pdf?arnumber=10017774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:50:42Z","timestamp":1707810642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/aiccsa56895.2022.10017774","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}