{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:04:42Z","timestamp":1769925882352,"version":"3.49.0"},"reference-count":20,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Plan of China","award":["2018YFB0803401"],"award-info":[{"award-number":["2018YFB0803401"]}]},{"name":"National Key Research and Development Plan of China","award":["328202203"],"award-info":[{"award-number":["328202203"]}]},{"name":"National Key Research and Development Plan of China","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2018YFB0803401"],"award-info":[{"award-number":["2018YFB0803401"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["328202203"],"award-info":[{"award-number":["328202203"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}]},{"name":"China Postdoctoral Science Foundation funded project","award":["2018YFB0803401"],"award-info":[{"award-number":["2018YFB0803401"]}]},{"name":"China Postdoctoral Science Foundation funded project","award":["328202203"],"award-info":[{"award-number":["328202203"]}]},{"name":"China Postdoctoral Science Foundation funded project","award":["2019M650606"],"award-info":[{"award-number":["2019M650606"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a series of network security threats and hidden dangers, including data leakage and remote attacks, which can directly threaten patients\u2019 lives. To ensure the security of medical information systems and expand the application of zero trust in the medical field, we combined the medical system with the zero-trust security system to propose a zero-trust medical security system. In addition, in its dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed to improve the security of medical equipment and data. Finally, the feasibility of the system is verified through a simulation experiment.<\/jats:p>","DOI":"10.3390\/s23073774","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T08:41:52Z","timestamp":1680770512000},"page":"3774","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Research on Medical Security System Based on Zero Trust"],"prefix":"10.3390","volume":"23","author":[{"given":"Zhiqiang","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Xinyue","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Peiyang","family":"Xue","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Yunhan","family":"Qu","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]},{"given":"Lei","family":"Ju","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute, Beijing 100070, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"ref_1","first-page":"717","article-title":"Build Internet plus health care innovation service mode\u2013create new experience for outpatients&apos; medical treatment","volume":"34","author":"Yang","year":"2021","journal-title":"Med. Theory Pract."},{"key":"ref_2","unstructured":"Tencent Smart Security (2023, March 10). Medical Industry Blackmail Virus Project. Available online: https:\/\/s.tencent.com\/research\/report\/535.html."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TC.2022.3157996","article-title":"A blockchain-based decentralized, fair and authenticated in formation sharing scheme in zero trust internet-of-things","volume":"72","author":"Liu","year":"2023","journal-title":"IEEE Trans. Comput."},{"key":"ref_4","unstructured":"Xie, L.J., Hang, F.L., Guo, W., Lv, Y., and Chen, H. (2021, January 26\u201328). A micro-segmentation protection scheme based on zero trust architecture. Proceedings of the ISCTT 2021, 6th International Conference on Information Science, Computer Technology and Transportation, Xishuangbanna, China."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhang, P.F., Tian, C., Shang, T., Liu, L., Li, L., Wang, W., and Zhao, Y.M. (2021, January 14\u201316). Dynamic access control technology based on zero-trust light verification network model. Proceedings of the 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Beijing, China.","DOI":"10.1109\/CISCE52179.2021.9445896"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chen, L., Dai, Z., Chen, M., and Li, N. (2021, January 29\u201330). Research on the security protection framework of power mobile internet services based on zero trust. Proceedings of the 2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA), Kunming, China.","DOI":"10.1109\/ICSGEA53208.2021.00021"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Fang, W., and Guan, X. (2022, January 4\u20136). Research on iOS remote security access technology based on zero trust. Proceedings of the 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China.","DOI":"10.1109\/ITOEC53115.2022.9734455"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vallathan, G., Rajamani, V., and Harinee, M.P. (2020, January 3\u20134). Enhanced medical data security and perceptual quality for healthcare services. Proceedings of the 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India.","DOI":"10.1109\/ICSCAN49426.2020.9262309"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"28975","DOI":"10.1109\/ACCESS.2022.3158756","article-title":"A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems","volume":"10","author":"Le","year":"2022","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Oh, H., Yu, J., Kim, N., Kim, D., Lee, J., and Yang, J. (2022, January 21\u201324). A federated binarized neural network model for constrained de vices in IoT healthcare services. Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Jeju Island, Korea.","DOI":"10.1109\/ICAIIC54071.2022.9722649"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sivasangari, A., Sonti, V.J.K.K., Ajitha, P., Deepa, D., and Vignesh, R. (2022, January 21\u201322). Integrated security framework for healthcare using blockchain and fog computing. Proceedings of the 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, India.","DOI":"10.1109\/PARC52418.2022.9726539"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MC.2020.3011081","article-title":"Beyond zero trust: Trust is a vulnerability","volume":"53","author":"Campbell","year":"2020","journal-title":"Computer"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tian, X.P., and Song, H.H. (2021, January 11\u201312). A zero trust method based on BLP and BIBA model. Proceedings of the 2021 14th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China.","DOI":"10.1109\/ISCID52796.2021.00031"},{"key":"ref_14","unstructured":"Khan, M.F.F., and Sakamura, K. (2020, January 17\u201319). A context-policy-based approach to access control for health care data protection. Proceedings of the 2020 International Computer Symposium (ICS), Tainan, Taiwan."},{"key":"ref_15","first-page":"14","article-title":"Implementation of fine-grained mandatory access control mechanism for multi-source object relational database","volume":"38","author":"Miao","year":"2021","journal-title":"Comput. Appl. Softw."},{"key":"ref_16","first-page":"30","article-title":"Research on authority complexity and reliability control model based on RBAC","volume":"39","author":"Yang","year":"2022","journal-title":"Comput. Appl. Softw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"688","DOI":"10.3724\/SP.J.1016.2009.00688","article-title":"A trust model based on Entity Behavior Risk Assessment","volume":"32","author":"Zhang","year":"2009","journal-title":"Chin. J. Comput."},{"key":"ref_18","first-page":"63","article-title":"Network security solutions based on zero trust Architecture","volume":"223","author":"Wang","year":"2019","journal-title":"Intell. Build."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10479-015-2046-7","article-title":"Ex-ante real estate value at risk calculation method","volume":"262","year":"2018","journal-title":"Ann. Oper. Res."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1966","DOI":"10.1007\/s13198-015-0411-1","article-title":"A cloud-user behavior assessment based dynamic access control model","volume":"8","author":"Jing","year":"2017","journal-title":"Int. J. Syst. Assur. Eng. Manag."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/7\/3774\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:11:20Z","timestamp":1760123480000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/7\/3774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,6]]},"references-count":20,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["s23073774"],"URL":"https:\/\/doi.org\/10.3390\/s23073774","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,6]]}}}