Visible to the public Real Identity Based Access Control Technology under Zero Trust Architecture

TitleReal Identity Based Access Control Technology under Zero Trust Architecture
Publication TypeConference Paper
Year of Publication2021
AuthorsWu, Ya Guang, Yan, Wen Hao, Wang, Jin Zhi
Conference Name2021 International Conference on Wireless Communications and Smart Grid (ICWCSG)
Date PublishedAug. 2021
PublisherIEEE
ISBN Number978-1-6654-2598-8
KeywordsAdmission control, Collaboration, Human Behavior, human factors, identity authentication, policy-based governance, pubcrawl, resilience, Resiliency, Scalability, zero trust, Zero trust architecture
AbstractWith the rapid development and application of emerging information technology, the traditional network security architecture is more and more difficult to support flexible dynamic and a wider range of business data access requirements. Zero trust technology can truly realize the aggregation of security and business by building an end-to-end dynamic new boundary based on identity, which puts forward a new direction for the upgrade and evolution of enterprise network security architecture. This paper mainly includes access control and identity authentication management functions. The goal of access control system is to ensure that legitimate and secure users can use the system normally, and then protect the security of enterprise network and server. The functions of the access control system include identifying the user's identity (legitimacy), evaluating the security characteristics (Security) of the user's machine, and taking corresponding response strategies.
URLhttps://ieeexplore.ieee.org/document/9616576
DOI10.1109/ICWCSG53609.2021.00011
Citation Keywu_real_2021