{"id":"https://openalex.org/W4387143738","doi":"https://doi.org/10.1145/3607947.3608067","title":"Zero trust security model: Defining new boundaries to organizational network","display_name":"Zero trust security model: Defining new boundaries to organizational network","publication_year":2023,"publication_date":"2023-08-03","ids":{"openalex":"https://openalex.org/W4387143738","doi":"https://doi.org/10.1145/3607947.3608067"},"language":"en","primary_location":{"id":"doi:10.1145/3607947.3608067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607947.3608067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016304186","display_name":"T N Nisha","orcid":null},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nisha T N","raw_affiliation_strings":["Symbiosis Centre for Information Technology(SCIT) ,Symbiosis International (Deemed University)(SIU), India"],"raw_orcid":"https://orcid.org/0000-0002-3197-6271","affiliations":[{"raw_affiliation_string":"Symbiosis Centre for Information Technology(SCIT) ,Symbiosis International (Deemed University)(SIU), India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068895642","display_name":"Dhanya Pramod","orcid":"https://orcid.org/0000-0003-3451-9794"},"institutions":[{"id":"https://openalex.org/I244572783","display_name":"Symbiosis International University","ror":"https://ror.org/005r2ww51","country_code":"IN","type":"education","lineage":["https://openalex.org/I244572783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhanya Pramod","raw_affiliation_strings":["Symbiosis Centre for Information Technology(SCIT) , Symbiosis International (Deemed University)(SIU), India"],"raw_orcid":"https://orcid.org/0000-0003-3451-9794","affiliations":[{"raw_affiliation_string":"Symbiosis Centre for Information Technology(SCIT) , Symbiosis International (Deemed University)(SIU), India","institution_ids":["https://openalex.org/I244572783"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103094209","display_name":"R. Singh","orcid":"https://orcid.org/0009-0007-4839-719X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravi Singh","raw_affiliation_strings":["Ernst &amp; Young, India, India"],"raw_orcid":"https://orcid.org/0009-0007-4839-719X","affiliations":[{"raw_affiliation_string":"Ernst &amp; Young, India, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016304186"],"corresponding_institution_ids":["https://openalex.org/I244572783"],"apc_list":null,"apc_paid":null,"fwci":0.7787,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73777539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"603","last_page":"609"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7214592695236206},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.6852811574935913},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5904852151870728},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5555925369262695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5306605100631714},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4655035138130188},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4571492671966553},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4481821358203888},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4480047821998596},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4326101541519165},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15042436122894287},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0875183641910553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7214592695236206},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.6852811574935913},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5904852151870728},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5555925369262695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5306605100631714},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4655035138130188},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4571492671966553},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4481821358203888},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4480047821998596},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4326101541519165},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15042436122894287},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0875183641910553},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3607947.3608067","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607947.3608067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2564172594","https://openalex.org/W2783420886","https://openalex.org/W2893010297","https://openalex.org/W2906828877","https://openalex.org/W3195846920","https://openalex.org/W3209426608","https://openalex.org/W4206089482","https://openalex.org/W4213034586","https://openalex.org/W4225760781","https://openalex.org/W4229334140","https://openalex.org/W4280574916","https://openalex.org/W4285197270","https://openalex.org/W4285205927","https://openalex.org/W4285327079","https://openalex.org/W4285817246","https://openalex.org/W4286696991","https://openalex.org/W4295185261","https://openalex.org/W4297033506","https://openalex.org/W4308085964","https://openalex.org/W4308089063","https://openalex.org/W4308274177","https://openalex.org/W4312558368","https://openalex.org/W4313054749","https://openalex.org/W4313328107","https://openalex.org/W4317600302","https://openalex.org/W4317600342","https://openalex.org/W4319863504","https://openalex.org/W4321090867","https://openalex.org/W4323646090"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2170801710","https://openalex.org/W2384861574","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W2142306706"],"abstract_inverted_index":{"The":[0,42],"zero-trust":[1,152,178],"security":[2,12,25,126],"model":[3,98],"is":[4,33],"a":[5,112,131,172],"modern":[6],"alternative":[7],"to":[8,36,77,88,106,164,176],"traditional":[9],"perimeter":[10,24,40],"network":[11,108],"and":[13,32,75,103,124,154],"has":[14],"been":[15],"gaining":[16],"popularity":[17],"over":[18],"the":[19,27,51,62,65,79,82,94,137,140,144,148,151,165,177],"last":[20],"several":[21],"years.":[22],"Traditional":[23],"suffers":[26],"problem":[28],"of":[29,44,53,67,84,150],"single-point":[30],"failure":[31],"compelling":[34],"enterprises":[35],"move":[37],"away":[38],"from":[39,72],"security.":[41],"paradigm":[43,153,174],"zero":[45,95,114],"trust":[46,85,96,115],"addresses":[47],"this":[48],"vulnerability":[49],"through":[50],"handling":[52],"every":[54],"host":[55],"as":[56],"though":[57],"they":[58],"are":[59],"faced":[60],"with":[61,136],"Internet.":[63],"As":[64],"number":[66],"organizations":[68,170],"moving":[69],"towards":[70,171],"working":[71],"home":[73],"increases":[74],"continues":[76],"be":[78,89],"new":[80],"normal,":[81],"definition":[83],"also":[86,129],"needs":[87],"evolved.":[90],"This":[91,160],"paper":[92,145,161],"discusses":[93],"protection":[97],"architecture,":[99],"its":[100],"accomplishment":[101],"measures":[102],"benefits":[104],"relative":[105],"other":[107],"models.":[109],"We":[110,128,142],"propose":[111],"multi-layer":[113],"architecture":[116],"which":[117],"includes":[118],"three":[119],"cascaded":[120],"layers,":[121],"four":[122],"enablers":[123],"five":[125],"attributes.":[127],"suggest":[130],"six-stage":[132],"implementation":[133],"framework":[134],"along":[135],"tools":[138],"aiding":[139],"stage.":[141],"summarize":[143],"by":[146,168],"reinforcing":[147],"advantages":[149],"listing":[155],"down":[156],"future":[157],"research":[158],"directions.":[159],"can":[162],"contribute":[163],"knowledge":[166],"base":[167],"directing":[169],"successful":[173],"shift":[175],"environment.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2023-09-29T00:00:00"}
