Login / Signup
Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement.
Adam Spanier
Rui Zhao
Pei-Chi Huang
Published in:
TrustCom (2023)
Keyphrases
</>
policy enforcement
enterprise network
ip addresses
access control
security management
trust model
identity management
traffic analysis
information systems
query processing
cellular networks