A novel zero-trust network access control scheme based on the security profile of devices and users.
Pedro García-TeodoroJosé CamachoGabriel Maciá-FernándezJosé Antonio Gómez-HernándezVictor José López-MarínPublished in: Comput. Networks (2022)
Keyphrases
- network traffic
- network security
- control scheme
- network access
- intrusion detection
- intrusion detection system
- security policies
- anomaly detection
- network connection
- closed loop
- control system
- control strategy
- dynamic model
- control law
- wireless networks
- information security
- mobile applications
- control loop
- predictive control
- trust relationships
- robot manipulators
- wireless technologies
- pid controller
- cloud computing
- user experience
- smart phones
- information sources
- computer simulation
- real time
- access control
- information systems