Application protection in 5G cloud network using zero trust architecture
Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network archi...
Saved in:
Main Author: | Guofeng HE |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020325/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on Satellite Internet Security Protection Based on Zero Trust
by: Yufei SONG, et al.
Published: (2021-09-01) -
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
by: Mohammed A. Aleisa
Published: (2025-01-01) -
Emerging Technologies Driving Zero Trust Maturity Across Industries
by: Hrishikesh Joshi
Published: (2025-01-01) -
New services and development trend in 5G environment
by: Zhenjiang DONG, et al.
Published: (2016-06-01) -
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
by: Pushpendra Kumar Verma, et al.
Published: (2024-12-01)