Zero-trust architecture is creating a passwordless society

被引:0
|
作者
Iggbom J. [1 ]
机构
[1] Curity
来源
Network Security | 2022年 / 2022卷 / 07期
关键词
D O I
10.12968/S1353-4858(22)70045-1
中图分类号
学科分类号
摘要
Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future. © 2022 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [41] dNextG: A Zero-Trust Decentralized Mobile Network User Plane
    West, Ryan W.
    Van der Merwe, Jacobus
    PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 15 - 24
  • [42] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [43] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [44] A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
    Ali, Belal
    Hijjawi, Simsam
    Campbell, Leith H.
    Gregory, Mark A.
    Li, Shuo
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] ZETA: Transparent Zero-Trust Security Add-on for RDMA
    Chang, Hyunseok
    Mukherjee, Sarit
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 1041 - 1050
  • [46] OZTrust: An O-RAN Zero-Trust Security System
    Jiang, Hao
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 129 - 134
  • [47] Stability Analysis for Heterogeneous Vehicle Platoon in A Zero-Trust Environment
    Bao, Yibo
    Huang, Darong
    Na, Yuhong
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 372 - 377
  • [48] The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm
    Bartakke, Jyoti
    Kashyap, Rajeshkumar
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2024, 48 (01) : 149 - 165
  • [49] Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture
    SumanPrakash, P.
    Ramana, K. Seshadri
    CosmePecho, Renzon Daniel
    Janardhan, M.
    Arellano, Meryelem Tania Churampi
    Mahalakshmi, J.
    Bhavsingh, M.
    Samunnisa, K.
    COMPUTER COMMUNICATIONS, 2024, 220 : 94 - 107
  • [50] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Hao, Min
    Tan, Beihai
    Wang, Siming
    Yu, Rong
    Liu, Ryan Wen
    Yu, Lisu
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)