Sign in

Zero trust security model: Defining new boundaries to organizational network.

T. N. NishaDhanya PramodRavi Singh
Published in: IC3 (2023)
Keyphrases
  • security model
  • public key
  • security architecture
  • information technology
  • information systems
  • security requirements
  • security analysis
  • software development
  • computer networks
  • individual level
  • provably secure