{"id":"https://openalex.org/W4388191438","doi":"https://doi.org/10.1109/cns59707.2023.10288810","title":"Towards Adaptive Zero Trust Model for Secure AI","display_name":"Towards Adaptive Zero Trust Model for Secure AI","publication_year":2023,"publication_date":"2023-10-02","ids":{"openalex":"https://openalex.org/W4388191438","doi":"https://doi.org/10.1109/cns59707.2023.10288810"},"language":"en","primary_location":{"id":"doi:10.1109/cns59707.2023.10288810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns59707.2023.10288810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100459334","display_name":"Kexin Zhang","orcid":"https://orcid.org/0000-0002-1046-9182"},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kexin Zhang","raw_affiliation_strings":["San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182","institution_ids":["https://openalex.org/I26538001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024969203","display_name":"Shengjie Xu","orcid":"https://orcid.org/0000-0003-2019-5186"},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shengjie Xu","raw_affiliation_strings":["San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182","institution_ids":["https://openalex.org/I26538001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024695245","display_name":"Bongsik Shin","orcid":"https://orcid.org/0000-0002-2031-1493"},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bongsik Shin","raw_affiliation_strings":["San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Fowler College of Business,Department of Management Information Systems,San Diego,CA,92182","institution_ids":["https://openalex.org/I26538001"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100459334"],"corresponding_institution_ids":["https://openalex.org/I26538001"],"apc_list":null,"apc_paid":null,"fwci":1.605,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8465715,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8144881725311279},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.6750553846359253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6700832843780518},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5328004360198975},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5140839219093323},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.47058239579200745},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4581199884414673},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.42752814292907715},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4220495820045471},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3545410931110382},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.2926042079925537},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26583823561668396},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1295035183429718},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08019563555717468}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8144881725311279},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.6750553846359253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6700832843780518},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5328004360198975},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5140839219093323},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.47058239579200745},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4581199884414673},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.42752814292907715},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4220495820045471},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3545410931110382},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.2926042079925537},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26583823561668396},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1295035183429718},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08019563555717468},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns59707.2023.10288810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns59707.2023.10288810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2969804742","https://openalex.org/W3047785415","https://openalex.org/W3048715803","https://openalex.org/W3184389706","https://openalex.org/W4206403426","https://openalex.org/W6770634426"],"related_works":["https://openalex.org/W3174927864","https://openalex.org/W2998983696","https://openalex.org/W4378191128","https://openalex.org/W4387039884","https://openalex.org/W2339277944","https://openalex.org/W2911783262","https://openalex.org/W1929087753","https://openalex.org/W4312215996","https://openalex.org/W3208507413","https://openalex.org/W2589805430"],"abstract_inverted_index":{"The":[0],"attack":[1],"surface":[2],"of":[3,61,81],"AI":[4,83,94],"is":[5,42],"expanding":[6],"and":[7,17,24,28,36,67,72,84],"posing":[8],"numerous":[9],"security":[10,59],"threats.":[11,95],"Threat":[12],"actors":[13],"have":[14],"created":[15],"new":[16],"unknown":[18],"vulnerabilities":[19],"against":[20,93],"intelligent":[21],"information":[22],"systems":[23],"critical":[25],"infrastructure.":[26],"Secure":[27,82],"adaptive":[29],"countermeasures":[30],"are":[31],"needed":[32],"when":[33],"detecting":[34],"threats":[35],"mitigating":[37],"risks.":[38],"Zero":[39,88],"Trust":[40,89],"Model":[41,90],"a":[43],"cybersecurity":[44],"paradigm":[45],"that":[46],"assumes":[47],"no":[48],"user":[49],"or":[50],"system":[51],"should":[52],"be":[53],"inherently":[54],"trusted.":[55],"It":[56],"applies":[57],"the":[58,79,87],"principle":[60],"Least":[62],"Privilege":[63],"to":[64,70,91],"network":[65],"access":[66],"Continuous":[68],"Verification":[69],"monitoring":[71],"auditing.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"study":[78],"landscape":[80],"envision":[85],"applying":[86],"defend":[92]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3}],"updated_date":"2026-01-16T23:16:36.188383","created_date":"2025-10-10T00:00:00"}
