Login / Signup

Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement.

Adam SpanierRui ZhaoPei-Chi Huang
Published in: TrustCom (2023)
Keyphrases
  • policy enforcement
  • enterprise network
  • ip addresses
  • access control
  • security management
  • trust model
  • identity management
  • traffic analysis
  • information systems
  • query processing
  • cellular networks