{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:44:53Z","timestamp":1730295893277,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/sera57763.2023.10197716","type":"proceedings-article","created":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T13:29:18Z","timestamp":1691069358000},"page":"440-445","source":"Crossref","is-referenced-by-count":3,"title":["Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model"],"prefix":"10.1109","author":[{"given":"Shigeaki","family":"Tanimoto","sequence":"first","affiliation":[{"name":"Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan"}]},{"given":"Sogen","family":"Hori","sequence":"additional","affiliation":[{"name":"Chiba Institute of Technology,Faculty of Social System Science,Narashino,Japan"}]},{"given":"Hiroyuki","family":"Sato","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Information Technology Center,Tokyo,Japan"}]},{"given":"Atsushi","family":"Kanai","sequence":"additional","affiliation":[{"name":"Hosei University,Faculty of Science and Engineering,Koganei,Japan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033265"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICBCTIS55569.2022.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE56475.2022.10014326"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3207862"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900563"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref2","first-page":"1","article-title":"Required Education Curriculum for DX with Cybersecurity","volume":"34","author":"fujimoto","year":"2021","journal-title":"Japan Society of Security Management"},{"journal-title":"What is Zero Trust? From the mechanism to the case study for the boundary type it is widely explained","year":"2020","key":"ref1"},{"journal-title":"World's No 1 accuracy in facial expression recognition technology","year":"2021","key":"ref17"},{"journal-title":"Methods for Classifying and Managing Confidential Information by Level","year":"2022","key":"ref16"},{"journal-title":"What is Zero Trust? Benefits issues and how to implement it explained","year":"2022","key":"ref8"},{"journal-title":"Rapid progress in global zero-trust implementation","year":"2021","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939780"},{"journal-title":"The latest authentication methods required in the age of cloud computing","year":"0","key":"ref4"},{"key":"ref3","first-page":"315","article-title":"Security in the Telework Era","volume":"14","author":"ichihashi","year":"2021","journal-title":"IEICE Communications Society Magazine"},{"journal-title":"The Japanese Company","article-title":"Actual condition survey of &#x201C;Zero Trust Architecture","year":"2021","key":"ref6"},{"key":"ref5","first-page":"717","author":"palmo","year":"2021","journal-title":"A Consideration of Scalability for Software Defined Perimeter Based on the Zero-trust Model IIAI-AAI2021"}],"event":{"name":"2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2023,5,23]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10197651\/10197644\/10197716.pdf?arnumber=10197716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T13:45:44Z","timestamp":1692625544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10197716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/sera57763.2023.10197716","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}