{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T13:14:09Z","timestamp":1778159649567,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,3]]},"DOI":"10.1145\/3607947.3608067","type":"proceedings-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:12:21Z","timestamp":1695946341000},"page":"603-609","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Zero trust security model: Defining new boundaries to organizational network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3197-6271","authenticated-orcid":false,"given":"Nisha","family":"T N","sequence":"first","affiliation":[{"name":"Symbiosis Centre for Information Technology(SCIT) ,Symbiosis International (Deemed University)(SIU), India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3451-9794","authenticated-orcid":false,"given":"Dhanya","family":"Pramod","sequence":"additional","affiliation":[{"name":"Symbiosis Centre for Information Technology(SCIT) , Symbiosis International (Deemed University)(SIU), India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4839-719X","authenticated-orcid":false,"given":"Ravi","family":"Singh","sequence":"additional","affiliation":[{"name":"Ernst &amp; Young, India, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DelBene K Medin M Murray R. The Road to Zero Trust (Security). DIB Zero Trust White Paper. 2019 Jul 9;9."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Buck C Olenberger C Schweizer A V\u00f6lter F Eymann T. Never trust always verify: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security. 2021 Nov 1;110:102436. https:\/\/doi.org\/10.1016\/j.cose.2021.102436","DOI":"10.1016\/j.cose.2021.102436"},{"key":"e_1_3_2_1_3_1","unstructured":"Zero Trust Security: A New Paradigm for a Changing World. Centrify. (2018). Retrieved from CIO Summints: https:\/\/www.ciosummits.com\/wp-zero-trust.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"Build security into your network's dna: The zero trust network architecture","author":"Kindervag J.","year":"2010","unstructured":"Kindervag J. Build security into your network's dna: The zero trust network architecture. Forrester Research Inc. 2010 Nov 5;27."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"He Y Huang D Chen L Ni Y Ma X. A survey on zero trust architecture: Challenges and future trends. Wireless Communications and Mobile Computing. 2022 Jun 15;2022. https:\/\/doi.org\/10.1155\/2022\/6476274","DOI":"10.1155\/2022"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249053"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Liu H Ai M Huang R Qiu R Li Y. Identity authentication for edge devices based on zero\u2010trust architecture. Concurrency and Computation: Practice and Experience. 2022 Oct 25;34(23):e7198. https:\/\/doi.org\/10.1002\/cpe.7198","DOI":"10.1002\/cpe.7198"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017914"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Xiao S Ye Y Kanwal N Newe T Lee B. SoK: context and risk aware access control for zero trust systems. Security and Communication Networks. 2022 Jun 30;2022. https:\/\/doi.org\/10.1155\/2022\/7026779","DOI":"10.1155\/2022"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.22"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00285-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS56106.2022.9919959"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17081-2_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Sengupta B Lakshminarayanan A. Distritrust: Distributed and low-latency access validation in zero-trust architecture. Journal of Information Security and Applications. 2021 Dec 1;63:103023. https:\/\/doi.org\/10.1016\/j.jisa.2021.103023","DOI":"10.1016\/j.jisa.2021.103023"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Zhao L Sun M Yang B Xie J Feng J. Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering. Journal of Intelligent & Fuzzy Systems. 2022 Jan 1(Preprint):1-3. DOI: 10.3233\/JIFS-220128","DOI":"10.3233\/JIFS-220128"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00243"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022194"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Awan SM Azad MA Arshad J Waheed U Sharif T. A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT. Information. 2023 Feb 16;14(2):129. https:\/\/doi.org\/10.3390\/info14020129","DOI":"10.3390\/info14020129"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"A Micro-Segmentation Protection Scheme Based on Zero Trust Architecture. InISCTT 2021","author":"Xie L","year":"2021","unstructured":"Xie L, Hang F, Guo W, Lv Y, Chen H. A Micro-Segmentation Protection Scheme Based on Zero Trust Architecture. InISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation 2021 Nov 26 (pp. 1-4). VDE."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCTCS53867.2022.00030"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16815-4_7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.131.2200513"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF55208.2022.00020"},{"key":"e_1_3_2_1_26_1","unstructured":"John P Nittala SS Suresh C. 5 Collating Threat Intelligence for Zero Trust Future Using Open-Source Tools."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918536"},{"key":"e_1_3_2_1_28_1","volume-title":"Zero trust network security model in containerized environments","author":"de Weever C","year":"2020","unstructured":"de Weever C, Andreou M. Zero trust network security model in containerized environments. University of Amsterdam: Amsterdam, The Netherlands. 2020 Feb 9."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Paul B Rao M. Zero-Trust Model for Smart Manufacturing Industry. Applied Sciences. 2023 Jan;13(1):221. https:\/\/doi.org\/10.3390\/app13010221","DOI":"10.3390\/app13010221"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"Ramezanpour K Jagannath J. Intelligent zero trust architecture for 5G\/6G networks: Principles challenges and the role of machine learning in the context of O-RAN. Computer Networks. 2022 Sep 11:109358. https:\/\/doi.org\/10.1016\/j.comnet.2022.109358","DOI":"10.1016\/j.comnet.2022.109358"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017774"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEICT55736.2022.9908891"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06791-4_48"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2639540"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.272"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS55553.2022.9925513"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00019"}],"event":{"name":"IC3 2023: 2023 Fifteenth International Conference on Contemporary Computing","location":"Noida India","acronym":"IC3 2023"},"container-title":["Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607947.3608067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:06Z","timestamp":1750178286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":37,"alternative-id":["10.1145\/3607947.3608067","10.1145\/3607947"],"URL":"https:\/\/doi.org\/10.1145\/3607947.3608067","relation":{},"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"2023-09-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}