{"id":"https://openalex.org/W7140235793","doi":"https://doi.org/10.1016/j.procs.2026.03.028","title":"Bridging the Zero Trust Gap: A Knowledge Management Approach to Business Data Protection","display_name":"Bridging the Zero Trust Gap: A Knowledge Management Approach to Business Data Protection","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7140235793","doi":"https://doi.org/10.1016/j.procs.2026.03.028"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.03.028","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.03.028","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.03.028","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mona A. Mohamed","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mona A. Mohamed","raw_affiliation_strings":["Towson University, 8000 York Road Towson, MD 21252-0001, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Towson University, 8000 York Road Towson, MD 21252-0001, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Beenish M. Chaudhry","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Beenish M. Chaudhry","raw_affiliation_strings":["The University of Louisiana, Lafayette, LA 70504, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Louisiana, Lafayette, LA 70504, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Joyram Chakraborty","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joyram Chakraborty","raw_affiliation_strings":["Towson University, 8000 York Road Towson, MD 21252-0001, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Towson University, 8000 York Road Towson, MD 21252-0001, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Kevin J. O\u2019Sullivan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kevin J. O\u2019Sullivan","raw_affiliation_strings":["New York Institute of Technology, 26 W. 61st St., New York, NY 10023-7692, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"New York Institute of Technology, 26 W. 61st St., New York, NY 10023-7692, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.575334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"278","issue":null,"first_page":"590","last_page":"597"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.23350000381469727,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.23350000381469727,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.07909999787807465,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.06310000270605087,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.642300009727478},{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.5824000239372253},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.559499979019165},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5516999959945679},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.48330000042915344},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.46650001406669617},{"id":"https://openalex.org/keywords/knowledge-sharing","display_name":"Knowledge sharing","score":0.4521999955177307},{"id":"https://openalex.org/keywords/body-of-knowledge","display_name":"Body of knowledge","score":0.4302000105381012},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4041999876499176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7928000092506409},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.670799970626831},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.642300009727478},{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.5824000239372253},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.559499979019165},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5516999959945679},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.48330000042915344},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.46650001406669617},{"id":"https://openalex.org/C2776604539","wikidata":"https://www.wikidata.org/wiki/Q6423395","display_name":"Knowledge sharing","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C186528591","wikidata":"https://www.wikidata.org/wiki/Q619544","display_name":"Body of knowledge","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4041999876499176},{"id":"https://openalex.org/C187572123","wikidata":"https://www.wikidata.org/wiki/Q2034224","display_name":"Personal knowledge management","level":3,"score":0.399399995803833},{"id":"https://openalex.org/C56814567","wikidata":"https://www.wikidata.org/wiki/Q1323686","display_name":"Explicit knowledge","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C84685590","wikidata":"https://www.wikidata.org/wiki/Q1540472","display_name":"Knowledge engineering","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.3255000114440918},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C191628500","wikidata":"https://www.wikidata.org/wiki/Q6423404","display_name":"Knowledge value chain","level":3,"score":0.3091999888420105},{"id":"https://openalex.org/C124469403","wikidata":"https://www.wikidata.org/wiki/Q1813993","display_name":"Procedural knowledge","level":3,"score":0.305400013923645},{"id":"https://openalex.org/C154240960","wikidata":"https://www.wikidata.org/wiki/Q2860294","display_name":"Database-centric architecture","level":5,"score":0.288100004196167},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C115925183","wikidata":"https://www.wikidata.org/wiki/Q1412694","display_name":"Knowledge-based systems","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C10590034","wikidata":"https://www.wikidata.org/wiki/Q1048431","display_name":"Enterprise architecture","level":3,"score":0.26739999651908875},{"id":"https://openalex.org/C14156362","wikidata":"https://www.wikidata.org/wiki/Q3235388","display_name":"Descriptive knowledge","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C2779561248","wikidata":"https://www.wikidata.org/wiki/Q743861","display_name":"Tacit knowledge","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.03.028","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.03.028","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.03.028","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.03.028","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4561252295970917}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2005309592","https://openalex.org/W2049596973","https://openalex.org/W2370293551","https://openalex.org/W2901339057","https://openalex.org/W3166178256","https://openalex.org/W3208346397","https://openalex.org/W4210984095","https://openalex.org/W4224241642","https://openalex.org/W4295016347","https://openalex.org/W4317600342","https://openalex.org/W4362496414","https://openalex.org/W4376605948","https://openalex.org/W4405944049","https://openalex.org/W4408086453","https://openalex.org/W4409356573","https://openalex.org/W4410997136","https://openalex.org/W4411796952","https://openalex.org/W4411889996"],"related_works":[],"abstract_inverted_index":{"The":[0,57,144],"aim":[1],"of":[2,11,26,118,131,205],"this":[3],"study":[4],"is":[5,96],"to":[6,19,78,107],"provide":[7],"an":[8],"integrative":[9],"review":[10],"how":[12,46],"knowledge":[13,37,65,109,122,132,137,150,209],"management":[14,38,66,133,138],"principles":[15],"can":[16,49],"be":[17],"leveraged":[18],"enhance":[20],"the":[21,31,34,91,176,179,194,197,203],"implementation":[22],"and":[23,40,53,67,128,149,168,190,208],"ongoing":[24],"maintenance":[25],"zero":[27,41,68,83,112,125,141,153,185,206],"trust":[28,42,69,84,93,113,126,142,154,186,207],"architecture.":[29,143],"Specifically,":[30],"authors":[32,58,145,180,195],"examine":[33],"intersections":[35],"between":[36],"processes":[39],"architecture":[43,70,85,114,155,187],"tenets,":[44],"highlighting":[45],"their":[47],"integration":[48],"create":[50],"a":[51,73],"cohesive":[52],"transformative":[54],"security":[55],"framework.":[56],"contribute":[59],"new":[60],"perspectives":[61],"by":[62],"synthesizing":[63],"diverse":[64],"approaches":[71],"into":[72,98,157],"novel":[74],"conceptual":[75],"model":[76,105],"designed":[77],"bridge":[79],"existing":[80,177],"gaps":[81],"in":[82,124,152,175],"implementation.":[86],"This":[87],"interdisciplinary":[88],"framework,":[89],"termed":[90],"\u201czero":[92],"cognosphere":[94],"architecture,\u201d":[95],"organized":[97],"three":[99,158],"logical":[100],"tiers:":[101],"(1)":[102,160],"modified":[103],"Nonaka":[104],"components":[106],"support":[108],"creation":[110],"for":[111,135,184,199],"implementation,":[115],"(2)":[116,163],"analysis":[117],"negative":[119],"impacts":[120],"on":[121],"status":[123],"architecture;":[127],"(3)":[129,169],"categorization":[130],"activities":[134],"operationalizing":[136],"systems":[139],"within":[140],"further":[146],"classify":[147],"collaboration":[148],"sharing":[151],"environments":[156],"domains:":[159],"human-to-human":[161],"collaboration,":[162],"policy":[164],"information":[165],"points":[166],"coordination,":[167],"human-to-machine":[170],"cooperation.":[171],"By":[172],"addressing":[173],"shortcomings":[174],"literature,":[178],"propose":[181],"practical":[182],"frameworks":[183],"deployment,":[188],"maintenance,":[189],"continuous":[191],"improvement.":[192],"Finally,":[193],"lay":[196],"groundwork":[198],"future":[200],"research":[201],"at":[202],"intersection":[204],"management.":[210]},"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-03-25T00:00:00"}
