{"id":"https://openalex.org/W4390604115","doi":"https://doi.org/10.1109/tr.2023.3345665","title":"Strategy for Implementing of Zero Trust Architecture","display_name":"Strategy for Implementing of Zero Trust Architecture","publication_year":2024,"publication_date":"2024-01-05","ids":{"openalex":"https://openalex.org/W4390604115","doi":"https://doi.org/10.1109/tr.2023.3345665"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2023.3345665","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043484497","display_name":"Mengru Tsai","orcid":"https://orcid.org/0009-0000-9908-7430"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Mengru Tsai","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003526972","display_name":"Shanhsin Lee","orcid":"https://orcid.org/0000-0001-5392-1207"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shanhsin Lee","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045359994","display_name":"Shiuh\u2010Pyng Shieh","orcid":"https://orcid.org/0000-0003-4077-2358"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shiuhpyng Winston Shieh","raw_affiliation_strings":["Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":15.694,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.999974,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"73","issue":"1","first_page":"93","last_page":"100"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.959,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience","score":0.61969626}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.741756},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.61969626},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.58167416},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5427137},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5408381},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5000577},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.49608192},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.459047},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3791258},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14604095},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09229854},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tr.2023.3345665","pdf_url":null,"source":{"id":"https://openalex.org/S87725633","display_name":"IEEE Transactions on Reliability","issn_l":"0018-9529","issn":["0018-9529","1558-1721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1785492489","https://openalex.org/W2903563112","https://openalex.org/W2976189582","https://openalex.org/W3166773116","https://openalex.org/W3215976421","https://openalex.org/W4229458102","https://openalex.org/W4236786653","https://openalex.org/W4313135279","https://openalex.org/W4385713434"],"related_works":["https://openalex.org/W4246289931","https://openalex.org/W4205824991","https://openalex.org/W3200723557","https://openalex.org/W3166545041","https://openalex.org/W2901729341","https://openalex.org/W2588198209","https://openalex.org/W2505244523","https://openalex.org/W2284759612","https://openalex.org/W2148952798","https://openalex.org/W1909006023"],"abstract_inverted_index":{"In":[0,181],"recent":[1],"years,":[2],"due":[3],"to":[4,15,20,28,65,75,93,107,150,164,203],"the":[5,8,57,68,78,100,108,123,170,187,191,195],"impact":[6],"of":[7,70,99,111,169,200],"COVID-19":[9],"pandemic,":[10],"enterprises":[11,41],"have":[12],"been":[13],"forced":[14],"adapt":[16],"their":[17,104],"operation":[18],"patterns":[19],"ensure":[21,165],"resilience,":[22],"transitioning":[23],"from":[24,31,56,59],"traditional":[25],"office-based":[26],"work":[27,30,76,95],"remote":[29,94],"home.":[32],"However,":[33],"this":[34,182],"sudden":[35],"and":[36,86,120,127,159,167,193,198,209],"unforeseen":[37],"change":[38],"has":[39],"made":[40],"unprepared,":[42],"resulting":[43],"in":[44,48,61,122,189,211],"a":[45,112],"dramatic":[46],"increase":[47],"cybersecurity":[49,213],"threats.":[50],"The":[51,133],"most":[52],"significant":[53],"challenge":[54],"arises":[55],"adjustment":[58],"working":[60],"previously":[62],"trusted":[63],"areas":[64],"that":[66],"beyond":[67],"boundaries":[69],"protection.":[71,144],"While":[72],"employees":[73,97],"used":[74],"within":[77],"company's":[79],"defense":[80],"perimeter,":[81],"malicious":[82],"attacks":[83],"were":[84],"blocked":[85],"detected":[87],"by":[88],"boundary":[89],"security":[90],"gateways.":[91],"Shifting":[92],"moves":[96],"out":[98],"protective":[101],"environment,":[102],"thereby":[103],"devices":[105],"connecting":[106],"internal":[109,124],"resources":[110],"company":[113],"become":[114,131],"exploitable":[115],"targets":[116],"for":[117,176],"threat":[118],"actors,":[119],"weaknesses":[121],"authentication,":[125,156],"authorization,":[126,158],"access":[128,151],"control":[129],"mechanisms":[130],"evident.":[132],"zero":[134],"trust":[135],"architecture":[136],"(ZTA)":[137],"approach":[138],"is":[139],"primarily":[140],"focused":[141],"on":[142,206],"resource":[143,171],"When":[145],"users":[146],"or":[147,178],"services":[148],"attempt":[149],"resources,":[152],"ZTA":[153],"requires":[154],"precise":[155],"minimal":[157],"continuous":[160],"verification":[161],"(trust":[162],"inference)":[163],"legitimacy":[166],"authorization":[168],"usage,":[172],"eliminating":[173],"any":[174],"space":[175],"assumed":[177],"inherited":[179],"trust.":[180],"article,":[183],"we":[184],"will":[185],"address":[186],"challenges":[188],"handling":[190],"threats":[192],"propose":[194],"strategies,":[196],"implementation,":[197],"limitation":[199],"ZTA,":[201],"aiming":[202],"shed":[204],"light":[205],"its":[207],"effectiveness":[208],"applicability":[210],"mitigating":[212],"risks.":[214]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390604115","counts_by_year":[{"year":2024,"cited_by_count":5}],"updated_date":"2024-12-30T21:02:31.363113","created_date":"2024-01-07"}