{"id":"https://openalex.org/W4317600342","doi":"https://doi.org/10.1109/aiccsa56895.2022.10017774","title":"Extending 5G services with Zero Trust security pillars: a modular approach","display_name":"Extending 5G services with Zero Trust security pillars: a modular approach","publication_year":2022,"publication_date":"2022-12-01","ids":{"openalex":"https://openalex.org/W4317600342","doi":"https://doi.org/10.1109/aiccsa56895.2022.10017774"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa56895.2022.10017774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa56895.2022.10017774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110719541","display_name":"Abdul Manan","orcid":"https://orcid.org/0000-0002-4231-8389"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdul Manan","raw_affiliation_strings":["Brown University,Providence,RI,USA","Brown University, Providence, RI, USA"],"affiliations":[{"raw_affiliation_string":"Brown University,Providence,RI,USA","institution_ids":["https://openalex.org/I27804330"]},{"raw_affiliation_string":"Brown University, Providence, RI, USA","institution_ids":["https://openalex.org/I27804330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068794211","display_name":"Ziran Min","orcid":"https://orcid.org/0009-0006-2820-754X"},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziran Min","raw_affiliation_strings":["Vanderbilt University,Nashville,TN,USA","Vanderbilt University, Nashville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University,Nashville,TN,USA","institution_ids":["https://openalex.org/I200719446"]},{"raw_affiliation_string":"Vanderbilt University, Nashville, TN, USA","institution_ids":["https://openalex.org/I200719446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031617787","display_name":"Charif Mahmoudi","orcid":"https://orcid.org/0000-0001-9865-4632"},"institutions":[{"id":"https://openalex.org/I4210137693","display_name":"Siemens (United States)","ror":"https://ror.org/04axb7e79","country_code":"US","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210137693"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charif Mahmoudi","raw_affiliation_strings":["Siemens Technology,Princeton,NJ,USA","Siemens Technology, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Siemens Technology,Princeton,NJ,USA","institution_ids":["https://openalex.org/I4210137693"]},{"raw_affiliation_string":"Siemens Technology, Princeton, NJ, USA","institution_ids":["https://openalex.org/I4210137693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072593207","display_name":"Valerio Formicola","orcid":null},"institutions":[{"id":"https://openalex.org/I149919469","display_name":"California Polytechnic State University","ror":"https://ror.org/001gpfp45","country_code":"US","type":"education","lineage":["https://openalex.org/I149919469"]},{"id":"https://openalex.org/I98947143","display_name":"California State Polytechnic University","ror":"https://ror.org/05by5hm18","country_code":"US","type":"education","lineage":["https://openalex.org/I98947143"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Valerio Formicola","raw_affiliation_strings":["California Polytechnic State University,Pomona,CA,USA","California Polytechnic State University, Pomona, CA, USA"],"affiliations":[{"raw_affiliation_string":"California Polytechnic State University,Pomona,CA,USA","institution_ids":["https://openalex.org/I98947143","https://openalex.org/I149919469"]},{"raw_affiliation_string":"California Polytechnic State University, Pomona, CA, USA","institution_ids":["https://openalex.org/I98947143","https://openalex.org/I149919469"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110719541"],"corresponding_institution_ids":["https://openalex.org/I27804330"],"apc_list":null,"apc_paid":null,"fwci":1.2786,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.81516927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7689821720123291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6286371946334839},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48793599009513855},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.46484464406967163},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.455597847700119},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4444460868835449}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7689821720123291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6286371946334839},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48793599009513855},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.46484464406967163},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.455597847700119},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4444460868835449},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa56895.2022.10017774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa56895.2022.10017774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2228706226","https://openalex.org/W2783156170","https://openalex.org/W2976189582","https://openalex.org/W2985336933","https://openalex.org/W3033473526","https://openalex.org/W3088530243","https://openalex.org/W3108402236","https://openalex.org/W3126221315","https://openalex.org/W3130493776","https://openalex.org/W3160370961","https://openalex.org/W3165829082","https://openalex.org/W3195846920","https://openalex.org/W4220963030","https://openalex.org/W4293060418","https://openalex.org/W4295185261"],"related_works":["https://openalex.org/W2787993192","https://openalex.org/W2901729341","https://openalex.org/W2158269427","https://openalex.org/W2275805942","https://openalex.org/W4381280689","https://openalex.org/W3033859939","https://openalex.org/W2847365777","https://openalex.org/W2148952798","https://openalex.org/W3166545041","https://openalex.org/W2355048207"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,85,88,112,194],"propose":[4,113],"a":[5,14,40,48,66,196],"modular":[6],"approach":[7,38],"to":[8,43,98,122,166,172,203,209],"implement":[9,99,123],"the":[10,45,91,95,119,124,159],"zero-trust":[11],"principles":[12],"in":[13,53,118],"5G":[15,26,54,96,109,120],"network.":[16],"As":[17],"more":[18,20],"and":[19,32,60,82,84,142,174,180,212],"critical":[21,56,184,210],"applications":[22],"take":[23,156],"advantage":[24,157],"of":[25,47,94,101,108,158,187,199],"features,":[27],"such":[28],"as":[29,105],"industrial":[30],"controls":[31,176,208],"remote":[33],"manufacturing,":[34],"zero":[35,205],"trust":[36,206],"security":[37],"is":[39,72],"valid":[41],"solution":[42],"harden":[44],"defense":[46],"potentially":[49],"extended":[50],"attack":[51],"surface":[52],"interconnected":[55],"systems.":[57],"The":[58],"Cybersecurity":[59],"Infrastructure":[61],"Security":[62,150],"Agency":[63],"(CISA)":[64],"provides":[65],"Zero":[67],"Trust":[68],"Maturity":[69],"Model":[70],"that":[71,87],"based":[73],"on":[74],"five":[75],"different":[76],"pillars":[77,103],"(user,":[78],"device,":[79],"network,":[80],"application":[81],"workload/data)":[83],"argue":[86],"can":[89],"exploit":[90],"service-based":[92],"architecture":[93],"core":[97,121],"each":[100,178,191],"these":[102],"incrementally":[104],"additional":[106,114],"services":[107],"networks.":[110],"Specifically,":[111],"network":[115,200],"functions":[116],"(NFs)":[117],"CISA":[125],"recommendations,":[126],"namely":[127],"User-Identity":[128],"Management":[129],"System":[130,134,138,144],"(UIMS),":[131],"User":[132],"Authentication":[133],"(UAS),":[135],"Access":[136],"Authorization":[137],"(AAS),":[139],"Endpoint":[140],"Detection":[141],"Response":[143],"(EDRS),":[145],"User-Behavior":[146],"Analysis":[147],"Function":[148],"(UBAF),":[149],"Assessment":[151],"Report":[152],"Generator":[153],"(SARG).":[154],"We":[155],"Packet":[160],"processing":[161,171],"at":[162],"user":[163],"level":[164],"(UPF)":[165],"provide":[167],"an":[168],"holistic":[169],"packet":[170],"decide":[173],"enforce":[175,204],"for":[177,190],"new":[179],"existing":[181],"connection":[182],"towards":[183],"resources.":[185,213],"Aware":[186],"limited":[188],"resources":[189],"traffic":[192,201],"analysis,":[193],"leverage":[195],"risk-based":[197],"prioritization":[198],"flows":[202],"access":[207],"asset":[211]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
