{"id":"https://openalex.org/W4403212648","doi":"https://doi.org/10.1109/clei64178.2024.10700484","title":"Security Mechanisms Used in Systems Based on Zero Trust Architecture: A Systematic Mapping","display_name":"Security Mechanisms Used in Systems Based on Zero Trust Architecture: A Systematic Mapping","publication_year":2024,"publication_date":"2024-08-12","ids":{"openalex":"https://openalex.org/W4403212648","doi":"https://doi.org/10.1109/clei64178.2024.10700484"},"language":"en","primary_location":{"id":"doi:10.1109/clei64178.2024.10700484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/clei64178.2024.10700484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 L Latin American Computer Conference (CLEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046617868","display_name":"Carlos Molina","orcid":"https://orcid.org/0000-0001-7629-0022"},"institutions":[{"id":"https://openalex.org/I75778554","display_name":"Federico Santa Mar\u00eda Technical University","ror":"https://ror.org/05510vn56","country_code":"CL","type":"education","lineage":["https://openalex.org/I75778554"]}],"countries":["CL"],"is_corresponding":true,"raw_author_name":"Carlos Manzano","raw_affiliation_strings":["Universidad T&#x00E9;cnica Federico Santa Mar&#x00E9;a,Departamento de Inform&#x00E1;tica,Valparaiso,Chile"],"affiliations":[{"raw_affiliation_string":"Universidad T&#x00E9;cnica Federico Santa Mar&#x00E9;a,Departamento de Inform&#x00E1;tica,Valparaiso,Chile","institution_ids":["https://openalex.org/I75778554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007439667","display_name":"Gast\u00f3n M\u00e1rquez","orcid":"https://orcid.org/0000-0003-0167-5969"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gast\u00f3n M\u00e1rquez","raw_affiliation_strings":["Universidad del B&#x00ED;o-B&#x00ED;o,Departamento de Ciencias de la Computaci&#x00F3;n y Tecnolog&#x00ED;as de la Informaci&#x00F3;n,Chill&#x00E1;n,Chile"],"affiliations":[{"raw_affiliation_string":"Universidad del B&#x00ED;o-B&#x00ED;o,Departamento de Ciencias de la Computaci&#x00F3;n y Tecnolog&#x00ED;as de la Informaci&#x00F3;n,Chill&#x00E1;n,Chile","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090884952","display_name":"Hern\u00e1n Astudillo","orcid":"https://orcid.org/0000-0002-6487-5813"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hern\u00e1n Astudillo","raw_affiliation_strings":["Universidad Andr&#x00E9;s Bello,ITiSB,Vi&#x00F1;a del Mar,Chile"],"affiliations":[{"raw_affiliation_string":"Universidad Andr&#x00E9;s Bello,ITiSB,Vi&#x00F1;a del Mar,Chile","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046617868"],"corresponding_institution_ids":["https://openalex.org/I75778554"],"apc_list":null,"apc_paid":null,"fwci":0.7546,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79192484,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7009000182151794,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7009000182151794,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.6894999742507935,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6333000063896179,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6547080278396606},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5172148942947388},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4931337535381317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4065524935722351},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.10044971108436584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6547080278396606},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5172148942947388},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4931337535381317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4065524935722351},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.10044971108436584},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/clei64178.2024.10700484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/clei64178.2024.10700484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 L Latin American Computer Conference (CLEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1975675278","https://openalex.org/W1999798506","https://openalex.org/W2128961774","https://openalex.org/W2247591845","https://openalex.org/W3018067527","https://openalex.org/W3082474355","https://openalex.org/W3108402236","https://openalex.org/W3119029232","https://openalex.org/W3132825608","https://openalex.org/W3153700385","https://openalex.org/W3160370961","https://openalex.org/W3165829082","https://openalex.org/W3169126164","https://openalex.org/W3195846920","https://openalex.org/W3209426608","https://openalex.org/W3214824720","https://openalex.org/W4223902894","https://openalex.org/W4224241642","https://openalex.org/W4231304298","https://openalex.org/W4282945617","https://openalex.org/W4285205927","https://openalex.org/W4286696991","https://openalex.org/W4291213652","https://openalex.org/W4292263371","https://openalex.org/W4292348078","https://openalex.org/W4293199628","https://openalex.org/W4294707097","https://openalex.org/W4294892922","https://openalex.org/W4300208034","https://openalex.org/W4307346197","https://openalex.org/W4309283053","https://openalex.org/W4312558368","https://openalex.org/W4316659551","https://openalex.org/W4318969288","https://openalex.org/W4319233998","https://openalex.org/W4323646090","https://openalex.org/W4327773108","https://openalex.org/W4367297572","https://openalex.org/W4377968483","https://openalex.org/W4381786572","https://openalex.org/W4387413010","https://openalex.org/W4391649861"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Zero":[0],"Trust":[1],"Architecture":[2],"(ZTA)":[3],"is":[4,156],"a":[5,72,157],"novel":[6],"security":[7,19,35,54,79,106,140,163,169,181],"approach":[8],"for":[9,26],"building":[10,41,84],"secure":[11],"systems.":[12,63,87],"ZTA-based":[13,42,86,175],"systems":[14,176],"are":[15,115,131],"built":[16],"with":[17,184],"specific":[18],"mechanisms":[20,36,55,80,107,141,170],"to":[21,76,121,177],"enforce":[22],"their":[23],"basic":[24],"tenets,":[25],"example,":[27],"explicit":[28],"verification":[29],"and":[30,69,129,153],"least":[31,124],"privilege.":[32],"Although":[33],"existing":[34],"have":[37],"been":[38],"useful":[39],"in":[40,82],"systems,":[43],"the":[44,67,78,83,132,180],"current":[45],"literature":[46],"does":[47],"not":[48],"provide":[49],"clear":[50],"guidance":[51],"on":[52,145],"which":[53,94],"should":[56],"be":[57],"used":[58,81,134],"by":[59],"developers":[60,173],"of":[61,71,85,93,113,139,149,167,174],"these":[62,168],"This":[64],"article":[65],"describes":[66],"design":[68],"results":[70],"systematic":[73],"mapping":[74],"study":[75],"identify":[77],"The":[88,165],"review":[89],"yielded":[90],"290":[91],"articles,":[92],"30":[95],"primary":[96],"studies":[97],"were":[98,108],"selected.":[99],"Key":[100],"findings":[101],"are:":[102],"(i)":[103],"24":[104],"different":[105],"reported;":[109],"(ii)":[110],"37":[111],"%":[112],"them":[114],"classified":[116],"into":[117],"access":[118],"control":[119],"techniques":[120],"implement":[122],"ZTA":[123,162,186],"priveleges":[125],"tenet;":[126],"(iii)":[127],"ABAC":[128],"AIM":[130],"most":[133],"mechanisms;":[135],"(iv)":[136],"over":[137],"half":[138],"(69":[142],"%)":[143],"focus":[144],"resisting":[146],"attacks":[147],"(instead":[148],"detecting":[150],"or":[151],"recovering);":[152],"(v)":[154],"experimentation":[155],"predominant":[158],"empirical":[159],"strategy":[160],"within":[161],"research.":[164],"identification":[166],"will":[171],"enable":[172],"effectively":[178],"address":[179],"challenges":[182],"associated":[183],"implementing":[185],"tenets.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
