{"id":"https://openalex.org/W3196576671","doi":"https://doi.org/10.1109/msec.2021.3091195","title":"Zero Trust Architecture: Does It Help?","display_name":"Zero Trust Architecture: Does It Help?","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W3196576671","doi":"https://doi.org/10.1109/msec.2021.3091195","mag":"3196576671"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2021.3091195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3091195","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9529122/09529255.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8013/9529122/09529255.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061694501"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":11.0018,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.98211553,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":"5","first_page":"95","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8309056162834167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7606453895568848},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6391469836235046},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6296349763870239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6047393083572388},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5475649237632751},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4954291582107544},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44447600841522217},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.43559014797210693},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13811257481575012}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8309056162834167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7606453895568848},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6391469836235046},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6296349763870239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6047393083572388},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5475649237632751},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4954291582107544},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44447600841522217},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.43559014797210693},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13811257481575012},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2021.3091195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3091195","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9529122/09529255.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/msec.2021.3091195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3091195","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9529122/09529255.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3196576671.pdf","grobid_xml":"https://content.openalex.org/works/W3196576671.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3022837604","https://openalex.org/W3022941358","https://openalex.org/W4250172065","https://openalex.org/W1973970227","https://openalex.org/W2366680355","https://openalex.org/W4385624470","https://openalex.org/W2152170894","https://openalex.org/W4321488532","https://openalex.org/W2886326201","https://openalex.org/W4386049434"],"abstract_inverted_index":{"Discusses":[0],"the":[1,38,67,87],"concept":[2],"of":[3,51,79],"zero":[4],"trust":[5],"architecture":[6],"(ZTA).":[7],"ZTA":[8,63,91],"has":[9],"been":[10],"introduced":[11],"as":[12,55,94],"a":[13,61,71],"fine-grained":[14],"defense":[15],"approach":[16],"paradigm":[17],"that":[18,32,69],"shifts":[19],"defenses":[20],"from":[21],"static,":[22],"network-based":[23],"perimeters":[24],"to":[25,99],"users,":[26],"assets,":[27],"and":[28,36,44,48,57,76],"resources.1":[29],"It":[30],"assumes":[31],"no":[33],"entities":[34],"outside":[35],"inside":[37],"protected":[39],"system":[40,72],"can":[41],"be":[42],"trusted":[43],"therefore":[45],"requires":[46,73],"articulated":[47],"high-coverage":[49],"deployment":[50,78],"security":[52,81],"controls,":[53],"such":[54],"authentication":[56],"access":[58],"control.":[59],"In":[60],"way,":[62],"is":[64,83,92],"not":[65],"new;":[66],"idea":[68],"securing":[70],"pervasive,":[74],"fine-grained,":[75],"continuous":[77],"layered":[80],"controls":[82],"quite":[84],"obvious.":[85],"However,":[86],"current":[88],"emphasis":[89],"on":[90],"important":[93],"it":[95],"pushes":[96],"systematic":[97],"approaches":[98],"cybersecurity.":[100]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
