Archive Calculate
Research on Security Threats Using VPN in Zero Trust Environments

Research on Security Threats Using VPN in Zero Trust Environments

2024-11-23 Rose, S.: NIST Special Publication 800-207, Zero Trust Architecture (2020) Google Scholar   Department of D

Related articles

Cisco QuickVPN Installation Tips for Windows Operating Systems Best VPN for Porn (2024): Unblock Porn & Watch Privately How to Configure a TP-Link Omada Gateway as an OpenVPN Server in Standalone Mode
  1. Rose, S.: NIST Special Publication 800-207, Zero Trust Architecture (2020)

    Google Scholar  

  2. Department of Defense (DoD): Zero Trust Reference Architecture (2022)

    Google Scholar  

  3. Kindervag, J.: Build security into your network’s DNA: the zero trust network architecture, pp. 1–26. Forrester Research Inc. (2010)

    Google Scholar  

  4. Sudakshina , M. , Khan , D.A. , Jain , S. : Cloud – base zero trust access control policy : an approach to support work – from – home drive by COVID-19 pandemic . New Gener . Comput .39, 599–622 (2021). https://doi.org/10.1007/s00354-021-00130-6

    Article 

    Google Scholar 

  5. Kerman , A. , Borchert , O. , Rose , S. , Tan , A. : implement a zero trust architecture . technical report , The MITRE Corporation ( 2020 )

    Google Scholar  

  6. Anil, G.: A zero trust security framework for granular insight on blind spot and comprehensive device protection in the enterprise of Internet of Things (E-IOT). BMS Institute of Technology (2021)

    Google Scholar  

  7. Uttecht, K.D.: Zero Trust (ZT) concepts for federal government architectures. Massachusetts Institute of Technology, Lexington, United States (2020)

    Google Scholar  

  8. CSA Singapore: The Singapore Cybersecurity Strategy 2021 (2021). https://www.csa.gov.sg/Tips-Resource/publications/2021/singapore-cybersecurity-strategy-2021

  9. CISA USA: Zero Trust Maturity Mode, Pre-decisional Draft (2021). https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf

  10. Ward , R. , Beyer , B. : BeyondCorp : a new approach to enterprise security ( 2014 )

    Google Scholar  

  11. Hwang, M.J.: Microsoft zero trust network strategy and implementation plan. Microsoft Cyber Security Solutions Group (2020)

    Google Scholar  

  12. Zimmer, B.: Location independent security approach (LISA). USENIX Security (2018)

    Google Scholar  

  13. Wright, C., Cowan, C., Morris, J., Smalley, S., Kroah-Hartman, G.: Linux security module framework. In: Ottawa Linux Symposium, vol. 8032, pp. 6–16 (2002)

    Google Scholar  

  14. Kim, S.Y., Jeong, K.H., Hwang, Y.N., Nyang, D.H.: Abnormal behavior detection for zero trust security model using deep learning. In: Korea Information Processing Society Collection of Academic Papers, vol. 28, no. 1, pp. 132–135 (2021)

    Google Scholar  

  15. Sun , P. , et al . : hybrid firmware analysis for know mobile and IoT security vulnerability . In : 2020 50th Annual IEEE / IFIP International Conference on Dependable Systems and Networks ( DSN ) . IEEE ( 2020 )

    Google Scholar  

  16. Rastogi, A., Nygard, K.E.: Software engineering principles and security vulnerabilities. In: CATA, pp. 180–190 (2019)

    Google Scholar  

  17. Corteggiani, N., Camurati, G., Francillon, A.: Inception: system-wide security testing of real-world embedded systems software. In: Proceedings of the USENIX Security Symposium (2018)

    Google Scholar  

  18. Chen, D.D., Egele, M., Woo, M., Brumley, D.: Towards automated dynamic analysis for Linux-based embedded firmware. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2016)

    Google Scholar  

  19. Costin , A. , Zarras , A. , Francillon , A. : automated dynamic firmware analysis at scale : a case study on embed web interface . In : proceeding of the ACM on Asia Conference on Computer and Communications Security ( ASIACCS ) ( 2016 )

    Google Scholar  

  20. Davidson , D. , Moench , B. , Ristenpart , T. , Jha , S. : FIE on firmware : find vulnerability in embed system using symbolic execution . In : proceeding of the USENIX Security Symposium ( 2013 )

    Google Scholar  

  21. Abeni, L., Kiraly, C.: Investigating the network performance of a real-time Linux Kernel. In: Proceedings of the 15th Real Time Linux Workshop (2013)

    Google Scholar