{"id":"https://openalex.org/W4320031242","doi":"https://doi.org/10.1109/milcom55135.2022.10017474","title":"Toward Zero Trust Security IN 5G Open Architecture Network Slices","display_name":"Toward Zero Trust Security IN 5G Open Architecture Network Slices","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4320031242","doi":"https://doi.org/10.1109/milcom55135.2022.10017474"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017474","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079318114","display_name":"Hisham A. Kholidy","orcid":"https://orcid.org/0000-0002-7673-5850"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hisham A. Kholidy","raw_affiliation_strings":["College of Engineering, SUNY Polytechnic Institute,Dept. of Networks and Computer Security,Utica,NY,USA","Dept. of Networks and Computer Security, College of Engineering, SUNY Polytechnic Institute, Utica, NY, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, SUNY Polytechnic Institute,Dept. of Networks and Computer Security,Utica,NY,USA","institution_ids":["https://openalex.org/I90965887"]},{"raw_affiliation_string":"Dept. of Networks and Computer Security, College of Engineering, SUNY Polytechnic Institute, Utica, NY, USA","institution_ids":["https://openalex.org/I90965887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073674089","display_name":"Andrew Karam","orcid":null},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Karam","raw_affiliation_strings":["The Air Force Research Laboratory (AFRL, RIGB),Rome,NY,USA","The Air Force Research Laboratory (AFRL, RIGB), Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"The Air Force Research Laboratory (AFRL, RIGB),Rome,NY,USA","institution_ids":["https://openalex.org/I1280414376"]},{"raw_affiliation_string":"The Air Force Research Laboratory (AFRL, RIGB), Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057335609","display_name":"J.L. Sidoran","orcid":null},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Sidoran","raw_affiliation_strings":["The Air Force Research Laboratory (AFRL, RIGB),Rome,NY,USA","The Air Force Research Laboratory (AFRL, RIGB), Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"The Air Force Research Laboratory (AFRL, RIGB),Rome,NY,USA","institution_ids":["https://openalex.org/I1280414376"]},{"raw_affiliation_string":"The Air Force Research Laboratory (AFRL, RIGB), Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100648380","display_name":"Mohammad Ashiqur Rahman","orcid":"https://orcid.org/0000-0002-2963-7430"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad A. Rahman","raw_affiliation_strings":["Florida International University,Dept of Electrical and Computer Engineering,USA","Dept of Electrical and Computer Engineering, Florida International University, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University,Dept of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Dept of Electrical and Computer Engineering, Florida International University, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071309872","display_name":"Mohamed Mahmoud","orcid":"https://orcid.org/0000-0002-8719-501X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Mahmoud","raw_affiliation_strings":["Tennessee Technological Univ.,Dept. of Electrical and Comp. Engineering,TN,USA","Dept. of Electrical and Comp. Engineering, Tennessee Technological Univ., TN, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Technological Univ.,Dept. of Electrical and Comp. Engineering,TN,USA","institution_ids":["https://openalex.org/I63920570"]},{"raw_affiliation_string":"Dept. of Electrical and Comp. Engineering, Tennessee Technological Univ., TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012520636","display_name":"Mahmoud M. Badr","orcid":"https://orcid.org/0000-0002-8986-001X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Badr","raw_affiliation_strings":["Tennessee Technological Univ.,Dept. of Electrical and Comp. Engineering,TN,USA","Dept. of Electrical and Comp. Engineering, Tennessee Technological Univ., TN, USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Technological Univ.,Dept. of Electrical and Comp. Engineering,TN,USA","institution_ids":["https://openalex.org/I63920570"]},{"raw_affiliation_string":"Dept. of Electrical and Comp. Engineering, Tennessee Technological Univ., TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041211620","display_name":"Maqsood Mahmud","orcid":"https://orcid.org/0000-0002-8478-6930"},"institutions":[{"id":"https://openalex.org/I8541234","display_name":"University College of Bahrain","ror":"https://ror.org/00m2z1b30","country_code":"BH","type":"education","lineage":["https://openalex.org/I8541234"]},{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Maqsood Mahmud","raw_affiliation_strings":["College of Business Administration, University. of Bahrain,Dept. of Management,Bahrain","Dept. of Management, College of Business Administration, University. of Bahrain, Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Business Administration, University. of Bahrain,Dept. of Management,Bahrain","institution_ids":["https://openalex.org/I8541234","https://openalex.org/I106663880"]},{"raw_affiliation_string":"Dept. of Management, College of Business Administration, University. of Bahrain, Bahrain","institution_ids":["https://openalex.org/I8541234","https://openalex.org/I106663880"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043200212","display_name":"Ahmed F. Sayed","orcid":"https://orcid.org/0000-0002-7926-0264"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ahmed F. Sayed","raw_affiliation_strings":["Telecom Egypt,Transmission department,Fayoum,Egypt","Transmission department, Telecom Egypt, Fayoum, Egypt"],"affiliations":[{"raw_affiliation_string":"Telecom Egypt,Transmission department,Fayoum,Egypt","institution_ids":[]},{"raw_affiliation_string":"Transmission department, Telecom Egypt, Fayoum, Egypt","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5079318114"],"corresponding_institution_ids":["https://openalex.org/I90965887"],"apc_list":null,"apc_paid":null,"fwci":7.5666,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.98859844,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"577","last_page":"582"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7322437763214111},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6971949338912964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6805071830749512},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5898169279098511},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5380925536155701},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.5234324932098389},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4835219383239746},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.44897547364234924},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4339095652103424},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4235479235649109},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4178907871246338},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4166596531867981},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38717564940452576},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.32206547260284424},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2225433588027954},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12486276030540466},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.109890878200531}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322437763214111},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6971949338912964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6805071830749512},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5898169279098511},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5380925536155701},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.5234324932098389},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4835219383239746},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.44897547364234924},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4339095652103424},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4235479235649109},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4178907871246338},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4166596531867981},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38717564940452576},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.32206547260284424},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2225433588027954},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12486276030540466},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.109890878200531},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017474","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom55135.2022.10017474","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1987513422","https://openalex.org/W2085686002","https://openalex.org/W2132354547","https://openalex.org/W2495244466","https://openalex.org/W2773124052","https://openalex.org/W2786881799","https://openalex.org/W2809553349","https://openalex.org/W2966349066","https://openalex.org/W2976189582","https://openalex.org/W2979771181","https://openalex.org/W2997388216","https://openalex.org/W2998342509","https://openalex.org/W3083463474","https://openalex.org/W3112536635","https://openalex.org/W4200551694","https://openalex.org/W4200578811","https://openalex.org/W4225705925","https://openalex.org/W4313187004"],"related_works":["https://openalex.org/W2393746923","https://openalex.org/W2390147412","https://openalex.org/W2116071707","https://openalex.org/W1977360481","https://openalex.org/W2363878185","https://openalex.org/W2756059695","https://openalex.org/W198076453","https://openalex.org/W3118368399","https://openalex.org/W2068847354","https://openalex.org/W2377807135"],"abstract_inverted_index":{"Developing":[0],"trust":[1],"in":[2,73,107],"5G":[3,108],"network":[4,20,64,105],"slicing":[5],"is":[6,65,78],"an":[7],"important":[8],"issue":[9],"since":[10],"as":[11],"mobile":[12],"networks":[13],"evolve":[14],"the":[15,23,48,60,74,79],"number":[16],"of":[17,25,62,70,104],"internal":[18],"components,":[19],"functions,":[21],"and":[22,50,101],"use":[24],"virtualized":[26],"elements":[27],"increase.":[28],"The":[29],"current":[30,49],"security":[31,76,82],"practices":[32],"that":[33,57,97],"are":[34,41],"based":[35],"on":[36,59],"a":[37,63,87,93],"perimeter/defense-in-depth":[38],"cybersecurity":[39,52],"approach":[40,69],"proven":[42],"to":[43,46],"be":[44],"ineffective":[45],"address":[47],"future":[51],"challenges":[53],"because":[54],"they":[55],"assume":[56],"everything":[58],"inside":[61],"trustworthy.":[66],"One":[67],"promising":[68],"growing":[71],"significance":[72],"telecom":[75],"sphere":[77],"Zero-Trust":[80],"(ZT)":[81],"model.":[83],"This":[84],"paper":[85],"opens":[86],"new":[88],"research":[89],"direction":[90],"for":[91],"implementing":[92],"real-time":[94],"ZT":[95],"framework":[96],"enables":[98],"trustworthy":[99],"deployment":[100],"secure":[102],"management":[103],"slices":[106],"open":[109],"architecture.":[110]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
