{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:38:29Z","timestamp":1774838309674,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377114","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Protection of Sensitive Data in Zero Trust Model"],"prefix":"10.1145","author":[{"given":"Iftekhar","family":"Ahmed","sequence":"first","affiliation":[{"name":"Department of ICT Bangladesh University of Professionals (BUP), Dhaka, Bangladesh"}]},{"given":"Tahmin","family":"Nahar","sequence":"additional","affiliation":[{"name":"Department of ICT Bangladesh University of Professionals (BUP), Dhaka, Bangladesh"}]},{"given":"Shahina Sultana","family":"Urmi","sequence":"additional","affiliation":[{"name":"Department of ICT Bangladesh University of Professionals (BUP), Dhaka, Bangladesh"}]},{"given":"Kazi Abu","family":"Taher","sequence":"additional","affiliation":[{"name":"Department of ICT Bangladesh University of Professionals (BUP), Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"European Parliament and Council \"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016"},{"key":"e_1_3_2_1_2_1","volume-title":"ABAC and RBAC: Scalable, Flexible, and Auditable Access, Management IT Pro May\/June","year":"2013","unstructured":"Ed Coyne and Timothy R. Weil, ABAC and RBAC: Scalable, Flexible, and Auditable Access, Management IT Pro May\/June 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"Technology Overview for Adaptive Access Control","year":"2014","unstructured":"Ant, Allan. Technology Overview for Adaptive Access Control, 29 May 2014, Gartner Research"},{"key":"e_1_3_2_1_4_1","volume-title":"March 23","author":"Kindervag J.","year":"2016","unstructured":"J. Kindervag, No More Chewy Centers: Zero Trust Model of Information Security, March 23, 2016, Forrester Research."},{"key":"e_1_3_2_1_5_1","volume-title":"November 5","author":"Kindervag J.","year":"2010","unstructured":"J. Kindervag, Build Security Into Your Network's DNA: The Zero Trust Network Architecture, November 5, 2010 Forrester Research."},{"key":"e_1_3_2_1_6_1","volume-title":"November 1","author":"Cunninghum C.","year":"2017","unstructured":"C. Cunninghum and J. Polard. The Eight Business and Security Benefit of Zero Trust, November 1, 2017, Forrester Research"},{"key":"e_1_3_2_1_7_1","volume-title":"Big Data and Security (IoTBS)","author":"Lee B.","year":"2017","unstructured":"B. Lee, R. Vanickis, F. Rogelios and P. Jacob, \"Situation Awarness based Risk Adaptable Access Control in Enterprise Netowrks,\" in 2nd International Conference on Internet of Things, Big Data and Security (IoTBS), Porto, 2017"},{"key":"e_1_3_2_1_8_1","volume-title":"ISSC","author":"Vanickis R","year":"2018","unstructured":"R Vanickis, P Jacob, S, Dehghanzadeh and B Lee(2018) Access Control Policy enforcement for Zero-Trust Networking, ISSC, Dec 2018 Belfast"},{"key":"e_1_3_2_1_9_1","first-page":"4","author":"Osborn B.","year":"2016","unstructured":"B. Osborn, J Mcwilliams, B Beyer and M. Saltonstall. Google Beyond Corp Design to Deployment, Login, Spring 2016 Vol 4, No 1","journal-title":"Google Beyond Corp Design to Deployment, Login"},{"key":"e_1_3_2_1_10_1","volume-title":"October","author":"Balaouras S.","year":"2018","unstructured":"S. Balaouras, C. Cunningham and P. Cerrato, Five steps of Zero Trust Network, October, 2018, Forrester Research."},{"key":"e_1_3_2_1_11_1","volume-title":"Zero Trust Is an Initial Step on the Roadmap to CARTA","author":"MacDonald N.","year":"2018","unstructured":"N. MacDonald, Zero Trust Is an Initial Step on the Roadmap to CARTA, 10 December, 2018, Gartner Research"},{"key":"e_1_3_2_1_12_1","volume-title":"DynFire: dynamic firewalling in heterogeneous networks,\" in Proceedings World Congress on Internet Security (WorldCIS)","author":"Kiesel S.","year":"2012","unstructured":"Vensmer and S. Kiesel, \"DynFire: dynamic firewalling in heterogeneous networks,\" in Proceedings World Congress on Internet Security (WorldCIS), 2012"},{"key":"e_1_3_2_1_13_1","volume-title":"SOSR, 19 April 03--04","author":"Zaheer Z.","year":"2018","unstructured":"Z. Zaheer, H. Chang, S. Mukherjee, and J. Van der Merwe (2018). eZTrust: Network-Independent Zero-Trust Parameterization for Microservices, SOSR, 19 April 03--04, 2019, San Jose, CA."}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","location":"Dhaka Bangladesh","acronym":"ICCA 2020"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:38Z","timestamp":1750202618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":13,"alternative-id":["10.1145\/3377049.3377114","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377114","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}