{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:19:33Z","timestamp":1776939573698,"version":"3.51.4"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/sccc63879.2024.10767657","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T18:52:30Z","timestamp":1733251950000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Quality Attributes for Zero Trust Architecture-Based Systems"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Manzano","sequence":"first","affiliation":[{"name":"EIC - Universidad Cat&#x00F3;lica del Norte,Coquimbo,Chile"}]},{"given":"Gast\u00f3n","family":"M\u00e1rquez","sequence":"additional","affiliation":[{"name":"Universidad del B&#x00ED;o-B&#x00ED;o,Depto. de Ciencias de la Computaci&#x00F3;n y Tecnolog&#x00ED;as de la Informaci&#x00F3;n,Chill&#x00E1;n,Chile"}]},{"given":"Hern\u00e1n","family":"Astudillo","sequence":"additional","affiliation":[{"name":"ITiSB - Universidad Andr&#x00E9;s Bello,Vi&#x00F1;a del Mar,Chile"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-023-1456-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103832"},{"key":"ref4","volume-title":"Software Architecture in Practice","author":"Bass","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"ref6","volume-title":"Distributed Trust Through the Lens of Software Architecture","author":"Lo","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3134112"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73100-7_58"},{"key":"ref9","first-page":"512","article-title":"Introducing zero trust by design: Principles and practice beyond the zero trust hype","author":"Home","year":"2021","journal-title":"Advances in Security, Networks, and Internet of Things"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3403\/30421227"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2011.62"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3546000.3546015"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"19487","DOI":"10.1109\/ACCESS.2023.3248622","article-title":"A Comprehensive Framework for Migrating to Zero Trust Architecture","volume":"11","author":"Phiayura","year":"2023","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.08.015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5144\/0256-4947.2017.79"},{"key":"ref17","author":"Kitchenham","year":"2007","journal-title":"Guidelines for performing systematic literature reviews in software engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/int.23037"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIS58898.2023.10253610"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS58381.2023.10127999"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IAECST57965.2022.10062213"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS55264.2022.9873739"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW55968.2022.00034"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCO56118.2022.10031702"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030566"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NCA57778.2022.10013559"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3558819.3558826"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3264152"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/info14020129"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4271\/2023-01-1001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041042"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00247"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE59016.2024.10444321"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103414"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CONECCT55679.2022.9865835"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00411-z"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4845"},{"issue":"98","key":"ref40","first-page":"19","article-title":"Software quality attributes and trade-offs","volume":"97","author":"Berander","year":"2005","journal-title":"Blekinge Institute of Technology"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32489-6_15"}],"event":{"name":"2024 43rd International Conference of the Chilean Computer Science Society (SCCC)","location":"Temuco, Chile","start":{"date-parts":[[2024,10,28]]},"end":{"date-parts":[[2024,10,30]]}},"container-title":["2024 43rd International Conference of the Chilean Computer Science Society (SCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10767577\/10767579\/10767657.pdf?arnumber=10767657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:54:38Z","timestamp":1736538878000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10767657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/sccc63879.2024.10767657","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}