Essays about: "Zero Trust"
Showing result 6 - 10 of 20 essays containing the words Zero Trust.
-
6. Peer-to-peer misbehaviour reporting using non-interactive zero-knowledge proofs in ETSI ITS-G5
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : In the future of intelligent transport systems, vehicles will communicate with other vehicles and infrastructure. Through this communication, vehicles can cooperate in traffic situations such as intersections and highway merging. This communication can also facilitate sharing of information about other vehicles. READ MORE
-
7. Zero Trust Adoption : Qualitative research on factors affecting the adoption of Zero Trust
University essay from Uppsala universitet/InformationssystemAbstract : The following qualitative research explores the adoption of Zero Trust in organisations from an organisational and user acceptance perspective. From an organisational perspective, the research highlights essential aspects such as testing the Zero Trust architecture in a pre-adoption phase, involving top management in the planning phase, communicating in a non-technical language, and making end-users feel a personal connection to IS security. READ MORE
-
8. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
9. ztLang : A Modelling Language for Zero Trust Networks
University essay from KTH/DatavetenskapAbstract : This work explores how zero trust architectures can be modelled in order to assess and improve network security. Cyber attacks are severely damaging and costly, and the frequency of such attacks continues to increase. Improving network security is imperative for preempting such attacks. READ MORE
-
10. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE